Key-Recovery Attacks on ASASA

被引:21
|
作者
Minaud, Brice [1 ]
Derbez, Patrick [2 ]
Fouque, Pierre-Alain [1 ,3 ]
Karpman, Pierre [4 ,5 ]
机构
[1] Univ Rennes 1, Rennes, France
[2] Univ Luxembourg, SnT, Luxembourg, Luxembourg
[3] Inst Univ France, Paris, France
[4] Inria, Paris, France
[5] Nanyang Technol Univ, Singapore 639798, Singapore
关键词
ASASA; Algebraic cryptanalysis; Multivariate cryptography; LPN; CRYPTANALYSIS; HFE; MATSUMOTO;
D O I
10.1007/978-3-662-48800-3_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ASASA construction is a new design scheme introduced at Asiacrypt 2014 by Biruykov, Bouillaguet and Khovratovich. Its versatility was illustrated by building two public-key encryption schemes, a secret-key scheme, as well as super S-box subcomponents of a white-box scheme. However one of the two public-key cryptosystems was recently broken at Crypto 2015 by Gilbert, Plut and Treger. As our main contribution, we propose a new algebraic key-recovery attack able to break at once the secret-key scheme as well as the remaining public-key scheme, in time complexity 2(63) and 2(39) respectively (the security parameter is 128 bits in both cases). Furthermore, we present a second attack of independent interest on the same public-key scheme, which heuristically reduces its security to solving an LPN instance with tractable parameters. This allows key recovery in time complexity 2(56). Finally, as a side result, we outline a very efficient heuristic attack on the white-box scheme, which breaks an instance claiming 64 bits of security under one minute on a single desktop computer.
引用
收藏
页码:3 / 27
页数:25
相关论文
共 50 条
  • [41] Practical Key-Recovery for All Possible Parameters of SFLASH
    Bouillaguet, Charles
    Fouque, Pierre-Alain
    Macario-Rat, Gilles
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 667 - +
  • [42] Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks
    Santoso, Bagus
    Oohama, Yasutada
    Su, Chunhua
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 3 - 17
  • [43] Weak-keys and key-recovery attack for TinyJAMBU
    Dutta, Pranjal
    Rajasree, Mahesh Sreekumar
    Sarkar, Santanu
    SCIENTIFIC REPORTS, 2022, 12 (01):
  • [44] A Key-Recovery Attack on Authentication Watermarking by Li and Yuan
    Schaathun, Hans Georg
    MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, 2008, : 221 - 225
  • [45] A Key-Recovery Attack on 855-round Trivium
    Fu, Ximing
    Wang, Xiaoyun
    Dong, Xiaoyang
    Meier, Willi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 160 - 184
  • [46] New Key-Recovery Attack on Reduced-Round AES
    Bardeh, Navid Ghaedi
    Rijmen, Vincent
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 43 - 62
  • [47] A family of weak keys in HFE and the corresponding practical key-recovery
    Bouillaguet, Charles
    Fouque, Pierre-Alain
    Joux, Antoine
    Treger, Joana
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2011, 5 (3-4) : 247 - 275
  • [48] Key-Recovery Fault Injection Attack on the Classic McEliece KEM
    Pircher, Sabine
    Geier, Johannes
    Danner, Julian
    Mueller-Gritschneder, Daniel
    Wachter-Zeh, Antonia
    CODE-BASED CRYPTOGRAPHY, CBCRYPTO 2022, 2023, 13839 : 37 - 61
  • [49] Practical Key-Recovery Attack on MQ-Sign and More
    Aulbach, Thomas
    Samardjiska, Simona
    Trimoska, Monika
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 168 - 185
  • [50] A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
    Faugere, Jean-Charles
    Gligoroski, Danilo
    Perret, Ludovic
    Samardjiska, Simona
    Thomae, Enrico
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 150 - 174