Conditional Cube Attack on Reduced-Round Keccak Sponge Function

被引:52
|
作者
Huang, Senyang [1 ]
Wang, Xiaoyun [1 ,2 ,3 ]
Xu, Guangwu [4 ]
Wang, Meiqin [2 ,3 ]
Zhao, Jingyuan [5 ]
机构
[1] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
[2] Shandong Univ, Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan 250100, Shandong, Peoples R China
[3] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[4] Univ Wisconsin, Dept EE & CS, Milwaukee, WI 53201 USA
[5] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Keccak-MAC; Keyak; Cube tester; Conditional cube variable; Ordinary cube variable; DIFFERENTIAL CRYPTANALYSIS;
D O I
10.1007/978-3-319-56614-6_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge function. As a notable example, the most efficient key recovery attacks on Keccak-MAC and Keyak were reported at EUROCRYPT'15 where cube attacks and cube-attack-like cryptanalysis have been applied. In this paper, we develop a new type of cube distinguisher, the conditional cube tester, for Keccak sponge function. By imposing some bit conditions for certain cube variables, we are able to construct cube testers with smaller dimensions. Our conditional cube testers are used to analyse Keccak in keyed modes. For reduced-round Keccak-MAC and Keyak, our attacks greatly improve the best known attacks in key recovery in terms of the number of rounds or the complexity. Moreover, our new model can also be applied to keyless setting to distinguish Keccak sponge function from random permutation. We provide a searching algorithm to produce the most efficient conditional cube tester by modeling it as an MILP (mixed integer linear programming) problem. As a result, we improve the previous distinguishing attacks on Keccak sponge function significantly. Most of our attacks have been implemented and verified by desktop computers. Finally we remark that our attacks on the reduced-round Keccak will not threat the security margin of Keccak sponge function.
引用
收藏
页码:259 / 288
页数:30
相关论文
共 50 条
  • [31] New Key-Recovery Attack on Reduced-Round AES
    Bardeh, Navid Ghaedi
    Rijmen, Vincent
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 43 - 62
  • [32] Zero-correlation linear attack on reduced-round SKINNY
    Zhang, Yi
    Cui, Ting
    Wang, Congjun
    FRONTIERS OF COMPUTER SCIENCE, 2023, 17 (04)
  • [33] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Wen, Long
    Wang, Mei-Qin
    Zhao, Jing-Yuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (01) : 165 - 176
  • [34] Related-Key Impossible Diferential Attack on Reduced-Round LBlock
    温隆
    王美琴
    赵静远
    Journal of Computer Science & Technology, 2014, 29 (01) : 165 - 176
  • [35] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Long Wen
    Mei-Qin Wang
    Jing-Yuan Zhao
    Journal of Computer Science and Technology, 2014, 29 : 165 - 176
  • [36] Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
    Aumasson, Jean-Philippe
    Dinur, Itai
    Meier, Willi
    Shamir, Adi
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 1 - +
  • [37] Cryptanalysis of Reduced-Round Whirlwind
    Ma, Bingke
    Li, Bao
    Hao, Ronglin
    Li, Xiaoqian
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 20 - 38
  • [38] Cryptanalysis of Reduced-Round DASH
    刘树生
    龚征
    王立斌
    Journal of Computer Science & Technology, 2013, 28 (01) : 159 - 164
  • [39] Cryptanalysis of Reduced-Round SipHash
    He, Le
    Yu, Hongbo
    COMPUTER JOURNAL, 2023, 67 (03): : 875 - 883
  • [40] Cryptanalysis of reduced-round MISTY
    Kühn, U
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 325 - 339