Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes

被引:21
|
作者
Gilbert, Henri [1 ]
Plut, Jerome [1 ]
Treger, Joana [1 ]
机构
[1] ANSSI, Paris, France
来源
ADVANCES IN CRYPTOLOGY, PT I | 2015年 / 9215卷
关键词
CRYPTANALYSIS;
D O I
10.1007/978-3-662-47989-6_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a cryptanalysis of the ASASA public key cipher introduced at Asiacrypt 2014 [3]. This scheme alternates three layers of affine transformations A with two layers of quadratic substitutions S. We show that the partial derivatives of the public key polynomials contain information about the intermediate layer. This enables us to present a very simple distinguisher between an ASASA public key and random polynomials. We then expand upon the ideas of the distinguisher to achieve a full secret key recovery. This method uses only linear algebra and has a complexity dominated by the cost of computing the kernels of 2(26) small matrices with entries in F-16.
引用
收藏
页码:475 / 490
页数:16
相关论文
共 50 条
  • [41] A hybrid medical image cryptosystem based on 4D-hyperchaotic S-boxes and logistic maps
    Sara M. Ahmed
    Hassan M.A.Elkamchouchi
    Adel Elfahar
    Walid El-Shafai
    Amira G. Mohamed
    Multimedia Tools and Applications, 2024, 83 : 8837 - 8865
  • [42] An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack
    Wang, Xin
    Yang, Bo
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (06) : 7734 - 7750
  • [43] A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer
    Mondal, Puja
    Kundu, Suparna
    Bhattacharya, Sarani
    Karmakar, Angshuman
    Verbauwhede, Ingrid
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 271 - 300
  • [44] Method for constructing key-dependent S-boxes based on affine transformation
    Ao, Tianyong
    He, Zhangqing
    Dai, Kui
    Zou, Xuecheng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2015, 43 (08): : 39 - 42
  • [45] A new symmetric block cipher based on key-dependent S-boxes
    Niemiec, Marcin
    Machowski, Lukasz
    IV INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS 2012 (ICUMT), 2012, : 474 - 478
  • [46] A Low-Complexity Key-Recovery Attack on 6-Round Midori64
    Xiaofeng Xie
    Tian Tian
    Journal of Systems Science and Complexity, 2023, 36 : 1738 - 1756
  • [47] A Low-Complexity Key-Recovery Attack on 6-Round Midori64
    XIE Xiaofeng
    TIAN Tian
    Journal of Systems Science & Complexity, 2023, 36 (04) : 1738 - 1756
  • [48] Quantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithm
    Zhou, Bao-Min
    Yuan, Zheng
    QUANTUM INFORMATION PROCESSING, 2021, 20 (10)
  • [49] A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem
    Fauzi, Prastudy
    Hovd, Martha Norberg
    Raddum, Havard
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 483 - 498
  • [50] Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL
    Yu, Hongbo
    Wang, Xiaoyun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 285 - +