Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes

被引:21
|
作者
Gilbert, Henri [1 ]
Plut, Jerome [1 ]
Treger, Joana [1 ]
机构
[1] ANSSI, Paris, France
来源
ADVANCES IN CRYPTOLOGY, PT I | 2015年 / 9215卷
关键词
CRYPTANALYSIS;
D O I
10.1007/978-3-662-47989-6_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a cryptanalysis of the ASASA public key cipher introduced at Asiacrypt 2014 [3]. This scheme alternates three layers of affine transformations A with two layers of quadratic substitutions S. We show that the partial derivatives of the public key polynomials contain information about the intermediate layer. This enables us to present a very simple distinguisher between an ASASA public key and random polynomials. We then expand upon the ideas of the distinguisher to achieve a full secret key recovery. This method uses only linear algebra and has a complexity dominated by the cost of computing the kernels of 2(26) small matrices with entries in F-16.
引用
收藏
页码:475 / 490
页数:16
相关论文
共 50 条
  • [1] Key-Recovery Attacks on ASASA
    Minaud, Brice
    Derbez, Patrick
    Fouque, Pierre-Alain
    Karpman, Pierre
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 3 - 27
  • [2] Key-Recovery Attacks on ASASA
    Brice Minaud
    Patrick Derbez
    Pierre-Alain Fouque
    Pierre Karpman
    Journal of Cryptology, 2018, 31 : 845 - 884
  • [3] Key-Recovery Attacks on ASASA
    Minaud, Brice
    Derbez, Patrick
    Fouque, Pierre-Alain
    Karpman, Pierre
    JOURNAL OF CRYPTOLOGY, 2018, 31 (03) : 845 - 884
  • [4] A Polynomial Time Key-Recovery Attack on the Sidon Cryptosystem
    Briaud, Pierre
    Tillich, Jean-Pierre
    Verbel, Javier
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 419 - 438
  • [5] Design of key-dependent bijective S-Boxes for color image cryptosystem
    Deb, Subhrajyoti
    Behera, Pratap Kumar
    OPTIK, 2022, 253
  • [6] Quantum key-recovery attack on Feistel structures
    Xiaoyang DONG
    Xiaoyun WANG
    ScienceChina(InformationSciences), 2018, 61 (10) : 240 - 246
  • [7] Quantum key-recovery attack on Feistel structures
    Dong, Xiaoyang
    Wang, Xiaoyun
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (10)
  • [8] A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps
    Iqtadar Hussain
    Amir Anees
    Muhammad Aslam
    Rehan Ahmed
    Nasir Siddiqui
    The European Physical Journal Plus, 133
  • [9] A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps
    Hussain, Iqtadar
    Anees, Amir
    Aslam, Muhammad
    Ahmed, Rehan
    Siddiqui, Nasir
    EUROPEAN PHYSICAL JOURNAL PLUS, 2018, 133 (04):
  • [10] Practical Key-Recovery Attack on MANTIS(5)
    Dobraunig, Christoph
    Eichlseder, Maria
    Kales, Daniel
    Mendel, Florian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) : 248 - 260