“…In the meantime, various techniques have been introduced to improve the framework of MitM attack, such as internal state guessing [30], splice-and-cut [2], initial structure [59], bicliques [11], 3-subset MitM [12], indirect-partial matching [2,59], sieve-in-the-middle [15], match-box [32], dissection [24], differential-aided MitM [14,31,41], nonlinear constrained neutral words [28], etc. Till now, the MitM attack and its variants have broken MD4 [34,44], MD5 [59], KeeLoq [39], HAVAL [4,60], GOST [40], GEA-1/2 [1,7], etc.…”