Key-Recovery Attacks on ASASA

被引:21
|
作者
Minaud, Brice [1 ]
Derbez, Patrick [2 ]
Fouque, Pierre-Alain [1 ,3 ]
Karpman, Pierre [4 ,5 ]
机构
[1] Univ Rennes 1, Rennes, France
[2] Univ Luxembourg, SnT, Luxembourg, Luxembourg
[3] Inst Univ France, Paris, France
[4] Inria, Paris, France
[5] Nanyang Technol Univ, Singapore 639798, Singapore
关键词
ASASA; Algebraic cryptanalysis; Multivariate cryptography; LPN; CRYPTANALYSIS; HFE; MATSUMOTO;
D O I
10.1007/978-3-662-48800-3_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ASASA construction is a new design scheme introduced at Asiacrypt 2014 by Biruykov, Bouillaguet and Khovratovich. Its versatility was illustrated by building two public-key encryption schemes, a secret-key scheme, as well as super S-box subcomponents of a white-box scheme. However one of the two public-key cryptosystems was recently broken at Crypto 2015 by Gilbert, Plut and Treger. As our main contribution, we propose a new algebraic key-recovery attack able to break at once the secret-key scheme as well as the remaining public-key scheme, in time complexity 2(63) and 2(39) respectively (the security parameter is 128 bits in both cases). Furthermore, we present a second attack of independent interest on the same public-key scheme, which heuristically reduces its security to solving an LPN instance with tractable parameters. This allows key recovery in time complexity 2(56). Finally, as a side result, we outline a very efficient heuristic attack on the white-box scheme, which breaks an instance claiming 64 bits of security under one minute on a single desktop computer.
引用
收藏
页码:3 / 27
页数:25
相关论文
共 50 条
  • [21] Improved key-recovery attacks on reduced-round WEM-8
    Liu, Jun
    Wang, Dachao
    Hu, Yupu
    Chen, Jie
    Wang, Baocang
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (10) : 2419 - 2448
  • [22] Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
    Contini, Scott
    Yin, Yiqun Lisa
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 37 - +
  • [23] Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation
    Delvaux, Jeroen
    Verbauwhede, Ingrid
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [24] Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
    Rohit, Raghvendra
    Hu, Kai
    Sarkar, Sumanta
    Sun, Siwei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (01) : 130 - 155
  • [25] Collision Attacks Against CAESAR Candidates Forgery and Key-Recovery Against AEZ and Marble
    Fuhr, Thomas
    Leurent, Gaetan
    Suder, Valentin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 510 - 532
  • [26] Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS’15
    Zhen Liu
    Yanbin Pan
    Jinwei Zheng
    Journal of Systems Science and Complexity, 2024, 37 : 1308 - 1325
  • [27] Quantum Key-Recovery on Full AEZ
    Bonnetain, Xavier
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 : 394 - 406
  • [28] Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS'15
    Liu, Zhen
    Pan, Yanbin
    Zheng, Jinwei
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2024, 37 (03) : 1308 - 1325
  • [29] Threshold key-recovery systems for RSA
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) : 48 - 54
  • [30] Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations
    Niu, Zhongfeng
    Hu, Kai
    Sun, Siwei
    Zhang, Zhiyu
    Wang, Meiqin
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IV, 2024, 14923 : 73 - 104