Key-Recovery Attacks on ASASA

被引:21
|
作者
Minaud, Brice [1 ]
Derbez, Patrick [2 ]
Fouque, Pierre-Alain [1 ,3 ]
Karpman, Pierre [4 ,5 ]
机构
[1] Univ Rennes 1, Rennes, France
[2] Univ Luxembourg, SnT, Luxembourg, Luxembourg
[3] Inst Univ France, Paris, France
[4] Inria, Paris, France
[5] Nanyang Technol Univ, Singapore 639798, Singapore
关键词
ASASA; Algebraic cryptanalysis; Multivariate cryptography; LPN; CRYPTANALYSIS; HFE; MATSUMOTO;
D O I
10.1007/978-3-662-48800-3_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ASASA construction is a new design scheme introduced at Asiacrypt 2014 by Biruykov, Bouillaguet and Khovratovich. Its versatility was illustrated by building two public-key encryption schemes, a secret-key scheme, as well as super S-box subcomponents of a white-box scheme. However one of the two public-key cryptosystems was recently broken at Crypto 2015 by Gilbert, Plut and Treger. As our main contribution, we propose a new algebraic key-recovery attack able to break at once the secret-key scheme as well as the remaining public-key scheme, in time complexity 2(63) and 2(39) respectively (the security parameter is 128 bits in both cases). Furthermore, we present a second attack of independent interest on the same public-key scheme, which heuristically reduces its security to solving an LPN instance with tractable parameters. This allows key recovery in time complexity 2(56). Finally, as a side result, we outline a very efficient heuristic attack on the white-box scheme, which breaks an instance claiming 64 bits of security under one minute on a single desktop computer.
引用
收藏
页码:3 / 27
页数:25
相关论文
共 50 条
  • [1] Key-Recovery Attacks on ASASA
    Brice Minaud
    Patrick Derbez
    Pierre-Alain Fouque
    Pierre Karpman
    Journal of Cryptology, 2018, 31 : 845 - 884
  • [2] Key-Recovery Attacks on ASASA
    Minaud, Brice
    Derbez, Patrick
    Fouque, Pierre-Alain
    Karpman, Pierre
    JOURNAL OF CRYPTOLOGY, 2018, 31 (03) : 845 - 884
  • [3] Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes
    Gilbert, Henri
    Plut, Jerome
    Treger, Joana
    ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 475 - 490
  • [4] Key-Recovery Attacks on CRAFT and WARP
    Sun, Ling
    Wang, Wei
    Wang, Meiqin
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 77 - 95
  • [5] Key-Recovery Attacks on Full KRAVATTE
    Chaigneau, Colin
    Fuhr, Thomas
    Gilbert, Henri
    Guo, Jian
    Jean, Jeremy
    Reinhard, Jean-Rene
    Song, Ling
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (01) : 5 - 28
  • [6] Quantum Linear Key-Recovery Attacks Using the QFT
    Schrottenloher, Andre
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 258 - 291
  • [7] Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
    Ye, Chen-Dong
    Tian, Tian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (03) : 81 - 102
  • [8] Key-Recovery Attacks on LED-Like Block Ciphers
    Xu, Linhong
    Guo, Jiansheng
    Cui, Jingyi
    Li, Mingming
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 585 - 595
  • [9] Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
    Cui, Tingting
    Grassi, Lorenzo
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 171 - 197
  • [10] The security of elastic block ciphers against key-recovery attacks
    Cook, Debra L.
    Yung, Moti
    Keromytis, Angelos D.
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 89 - +