Conditional Cube Attack on Reduced-Round Keccak Sponge Function

被引:52
|
作者
Huang, Senyang [1 ]
Wang, Xiaoyun [1 ,2 ,3 ]
Xu, Guangwu [4 ]
Wang, Meiqin [2 ,3 ]
Zhao, Jingyuan [5 ]
机构
[1] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
[2] Shandong Univ, Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan 250100, Shandong, Peoples R China
[3] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[4] Univ Wisconsin, Dept EE & CS, Milwaukee, WI 53201 USA
[5] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Keccak-MAC; Keyak; Cube tester; Conditional cube variable; Ordinary cube variable; DIFFERENTIAL CRYPTANALYSIS;
D O I
10.1007/978-3-319-56614-6_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge function. As a notable example, the most efficient key recovery attacks on Keccak-MAC and Keyak were reported at EUROCRYPT'15 where cube attacks and cube-attack-like cryptanalysis have been applied. In this paper, we develop a new type of cube distinguisher, the conditional cube tester, for Keccak sponge function. By imposing some bit conditions for certain cube variables, we are able to construct cube testers with smaller dimensions. Our conditional cube testers are used to analyse Keccak in keyed modes. For reduced-round Keccak-MAC and Keyak, our attacks greatly improve the best known attacks in key recovery in terms of the number of rounds or the complexity. Moreover, our new model can also be applied to keyless setting to distinguish Keccak sponge function from random permutation. We provide a searching algorithm to produce the most efficient conditional cube tester by modeling it as an MILP (mixed integer linear programming) problem. As a result, we improve the previous distinguishing attacks on Keccak sponge function significantly. Most of our attacks have been implemented and verified by desktop computers. Finally we remark that our attacks on the reduced-round Keccak will not threat the security margin of Keccak sponge function.
引用
收藏
页码:259 / 288
页数:30
相关论文
共 50 条
  • [1] New Distinguisher on Reduced-Round Keccak Sponge Function
    Huang, Senyang
    Wang, Xiaoyun
    Xu, Guangwu
    Wang, Meiqin
    Zhao, Jingyuan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01) : 242 - 250
  • [2] Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
    Dinur, Itai
    Morawiecki, Pawel
    Pieprzyk, Josef
    Srebrny, Marian
    Straus, Michal
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 733 - 761
  • [3] A Cube Attack on a Reduced-Round Sycon
    Cho, Minjeong
    Eom, Hyejin
    Tcydenova, Erzhena
    Lee, Changhoon
    ELECTRONICS, 2022, 11 (21)
  • [4] Cube Attack on Reduced-Round Quavium
    Zhang, Shiyong
    Chen, Gongliang
    Li, Jianhua
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 135 - 139
  • [5] Differential Biases in Reduced-Round Keccak
    Das, Sourav
    Meier, Willi
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 69 - 87
  • [6] Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC
    Zhao, Zishen
    Chen, Shiyao
    Wang, Meiqin
    Wang, Wei
    INFORMATION PROCESSING LETTERS, 2021, 171
  • [7] Cube Attack on Reduced-Round Enhanced-Bivium
    Zhang, Shiyong
    Chen, Gongliang
    Li, Jianhua
    2016 INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2016,
  • [8] Practical Analysis of Reduced-Round KECCAK
    Naya-Plasencia, Maria
    Rock, Andrea
    Meier, Willi
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 236 - +
  • [9] Cube-Attack-Like Cryptanalysis of Round-Reduced KECCAK Using MILP
    Song, Ling
    Guo, Jian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (03) : 182 - 214
  • [10] New Conditional Cube Attack on Keccak Keyed Modes
    Li, Zheng
    Dong, Xiaoyang
    Bi, Wenquan
    Jia, Keting
    Wang, Xiaoyun
    Meier, Willi
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (02) : 94 - 124