Key-Recovery Attacks on ASASA

被引:21
|
作者
Minaud, Brice [1 ]
Derbez, Patrick [2 ]
Fouque, Pierre-Alain [1 ,3 ]
Karpman, Pierre [4 ,5 ]
机构
[1] Univ Rennes 1, Rennes, France
[2] Univ Luxembourg, SnT, Luxembourg, Luxembourg
[3] Inst Univ France, Paris, France
[4] Inria, Paris, France
[5] Nanyang Technol Univ, Singapore 639798, Singapore
关键词
ASASA; Algebraic cryptanalysis; Multivariate cryptography; LPN; CRYPTANALYSIS; HFE; MATSUMOTO;
D O I
10.1007/978-3-662-48800-3_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ASASA construction is a new design scheme introduced at Asiacrypt 2014 by Biruykov, Bouillaguet and Khovratovich. Its versatility was illustrated by building two public-key encryption schemes, a secret-key scheme, as well as super S-box subcomponents of a white-box scheme. However one of the two public-key cryptosystems was recently broken at Crypto 2015 by Gilbert, Plut and Treger. As our main contribution, we propose a new algebraic key-recovery attack able to break at once the secret-key scheme as well as the remaining public-key scheme, in time complexity 2(63) and 2(39) respectively (the security parameter is 128 bits in both cases). Furthermore, we present a second attack of independent interest on the same public-key scheme, which heuristically reduces its security to solving an LPN instance with tractable parameters. This allows key recovery in time complexity 2(56). Finally, as a side result, we outline a very efficient heuristic attack on the white-box scheme, which breaks an instance claiming 64 bits of security under one minute on a single desktop computer.
引用
收藏
页码:3 / 27
页数:25
相关论文
共 50 条
  • [31] Polynomial-Time Key-Recovery Attacks Against NTRURe Encrypt from ASIACCS'15
    LIU Zhen
    PAN Yanbin
    ZHENG Jinwei
    Journal of Systems Science & Complexity, 2024, (03) : 1308 - 1325
  • [32] Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak
    Zhou, Haibo
    Li, Zheng
    Dong, Xiaoyang
    Jia, Keting
    Meier, Willi
    COMPUTER JOURNAL, 2020, 63 (08): : 1231 - 1246
  • [33] Quantum key-recovery attack on Feistel structures
    Xiaoyang DONG
    Xiaoyun WANG
    ScienceChina(InformationSciences), 2018, 61 (10) : 240 - 246
  • [34] Quantum key-recovery attack on Feistel structures
    Dong, Xiaoyang
    Wang, Xiaoyun
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (10)
  • [35] New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
    Wang, Lei
    Ohta, Kazuo
    Kunihiro, Noboru
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 237 - 253
  • [36] Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
    Guo Q.
    Hlauschek C.
    Johansson T.
    Lahr N.
    Nilsson A.
    Schröder R.L.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (03): : 223 - 263
  • [37] Practical Key-Recovery Attack on MANTIS(5)
    Dobraunig, Christoph
    Eichlseder, Maria
    Kales, Daniel
    Mendel, Florian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) : 248 - 260
  • [38] Quantum key-recovery attack on Feistel structures
    Xiaoyang Dong
    Xiaoyun Wang
    Science China Information Sciences, 2018, 61
  • [39] Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
    Fouque, Pierre-Alain
    Leurent, Gaetan
    Nguyen, Phong Q.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 13 - 30
  • [40] A Polynomial Time Key-Recovery Attack on the Sidon Cryptosystem
    Briaud, Pierre
    Tillich, Jean-Pierre
    Verbel, Javier
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 419 - 438