Related Concepts
Definition
Following the idea behind the meet-in-the-middle approach, the miss-in-the-middle attack is one of the techniques to construct distinguishers for the impossible differential attack. The idea is that one finds two events that propagate half way through the cipher top and bottom with certainty, but which do not match in the middle. This results in an event which is impossible for the full cipher, i.e., has zero probability. A typical tool for constructing such events would be truncated differentials. Note that it is sufficient that events contradict each other in a single bit in the middle.
Background
This technique was first introduced in the papers by Biham et al. [1, 2] to cryptanalyze round-reduced versions of Skipjack, IDEA, and Khufu.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Biham E, Biryukov A, Shamir A (1999) Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: Stern J (ed) Advances in cryptology – eurocrypt’99. Lecture notes in computer science, vol 1593. Springer, Berlin, pp 12–23
Biham E, Biryukov A, Shamir A (1999) Miss in the middle attacks on IDEA and Khufu. In: Knudsen LR (ed) Fast software encryption, FSE’99. Lecture notes in computer science, vol 1636. Springer, Berlin, pp 124–138
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Biryukov, A. (2011). Miss-in-the-Middle Attack. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_598
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_598
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering