Key-Recovery Attacks on Full KRAVATTE

被引:7
|
作者
Chaigneau, Colin [1 ]
Fuhr, Thomas [2 ]
Gilbert, Henri [1 ,2 ]
Guo, Jian [3 ]
Jean, Jeremy [2 ]
Reinhard, Jean-Rene [2 ]
Song, Ling [3 ,4 ]
机构
[1] Univ Versailles St Quentin En Yvelines UVSQ, Versailles, France
[2] Agence Natl Secur Syst Informat ANSSI, Paris, France
[3] Nanyang Technol Univ, Singapore, Singapore
[4] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptanalysis; Higher Order Differential; Algebraic Attack; Filtered LFSR;
D O I
10.13154/tosc.v2018.i1.5-28
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a cryptanalysis of full KRAVATTE, an instantiation of the Farfalle construction of a pseudorandom function (PRF) with variable input and output length. This new construction, proposed by Bertoni et al., introduces an efficiently parallelizable and extremely versatile building block for the design of symmetric mechanisms, e.g. message authentication codes or stream ciphers. It relies on a set of permutations and on so-called rolling functions: it can be split into a compression layer followed by a two-step expansion layer. The key is expanded and used to mask the inputs and outputs of the construction. KRAVATTE instantiates Farfalle using linear rolling functions and permutations obtained by iterating the Keccak round function. We develop in this paper several attacks against this PRF, based on three different attack strategies that bypass part of the construction and target a reduced number of permutation rounds. A higher order differential distinguisher exploits the possibility to build an affine space of values in the cipher state after the compression layer. An algebraic meet-in-the-middle attack can be mounted on the second step of the expansion layer. Finally, due to the linearity of the rolling function and the low algebraic degree of the Keccak round function, a linear recurrence distinguisher can be found on intermediate states of the second step of the expansion layer. All the attacks rely on the ability to invert a small number of the final rounds of the construction. In particular, the last two rounds of the construction together with the final masking by the key can be algebraically inverted, which allows to recover the key. The complexities of the devised attacks, applied to the KRAVATTE specifications published on the IACR ePrint in July 2017, or the strengthened version of KRAVATTE recently presented at ECC 2017, are far below the security claimed.
引用
收藏
页码:5 / 28
页数:24
相关论文
共 50 条
  • [21] Improved key-recovery attacks on reduced-round WEM-8
    Jun Liu
    Dachao Wang
    Yupu Hu
    Jie Chen
    Baocang Wang
    Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
  • [22] Improved key-recovery attacks on reduced-round WEM-8
    Liu, Jun
    Wang, Dachao
    Hu, Yupu
    Chen, Jie
    Wang, Baocang
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (10) : 2419 - 2448
  • [23] Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
    Contini, Scott
    Yin, Yiqun Lisa
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 37 - +
  • [24] Redefining Security in Shadow Cipher for IoT Nodes: New Full-Round Practical Distinguisher and the Infeasibility of Key-Recovery Attacks
    Kim, Sunyeop
    Shin, Myoungsu
    Kim, Seonkyu
    Shin, Hanbeom
    Kim, Insung
    Kwon, Donggeun
    Lee, Dongjae
    Kim, Seonggyeom
    Hong, Deukjo
    Sung, Jaechul
    Hong, Seokhie
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 6805 - 6817
  • [25] Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation
    Delvaux, Jeroen
    Verbauwhede, Ingrid
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [26] Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
    Rohit, Raghvendra
    Hu, Kai
    Sarkar, Sumanta
    Sun, Siwei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (01) : 130 - 155
  • [27] Collision Attacks Against CAESAR Candidates Forgery and Key-Recovery Against AEZ and Marble
    Fuhr, Thomas
    Leurent, Gaetan
    Suder, Valentin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 510 - 532
  • [28] Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS’15
    Zhen Liu
    Yanbin Pan
    Jinwei Zheng
    Journal of Systems Science and Complexity, 2024, 37 : 1308 - 1325
  • [29] Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS'15
    Liu, Zhen
    Pan, Yanbin
    Zheng, Jinwei
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2024, 37 (03) : 1308 - 1325
  • [30] Threshold key-recovery systems for RSA
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) : 48 - 54