Skip to search formSkip to main contentSkip to account menu

Meet-in-the-middle attack

Known as: MITM, Meet in the middle attack, Meet-in-the-middle 
The Meet-in-the-Middle attack (MITM) is a generic space–time tradeoff cryptographic attack.
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The SIGABA is an electromechanical en cryption device used by the US during WWII and in the 1950s. Also known as ECM Mark II… 
2018
2018
The hybrid lattice reduction and meet-in-the-middle attack (the hybrid attack) is currently one of the most practical attacks on… 
2015
2015
We show key recovery attacks on generic balanced Feistel ciphers. The analysis is based on the meet-in-the-middle technique and… 
2013
2013
The block cipher GOST (GOST 28147-89) is a Russian standard for encryption and message authentication that is included in OpenSSL… 
2012
2012
Crypton, one of AES candidates, is a 128 bit block cipher of SPN structure proposed by Lim. By means of the concept of Multiset… 
2012
2012
SNAKE is a Feistel cipher proposed by Lee and Cha at JW-ISC 1997.It has two versions,i.e.SNAKE(1) and SNAKE(2).The security of… 
2012
2012
A 5-round meet-in-the-middle distinguisher is constructed by exploiting the properties of Rijndael-256 cipher.It shows that,if… 
2009
2009
We propose preimage and pseudo-preimage attacks on short output lengths of the hash function 3-pass HAVAL, which is designed to… 
2007
2007
We show that a 2112.9 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to… 
1998
1998
Ding et al [DNRS97] propose a stream generator based on several layers. We present several attacks. First, we observe that the…