Key-Recovery Attacks on Full KRAVATTE

被引:7
|
作者
Chaigneau, Colin [1 ]
Fuhr, Thomas [2 ]
Gilbert, Henri [1 ,2 ]
Guo, Jian [3 ]
Jean, Jeremy [2 ]
Reinhard, Jean-Rene [2 ]
Song, Ling [3 ,4 ]
机构
[1] Univ Versailles St Quentin En Yvelines UVSQ, Versailles, France
[2] Agence Natl Secur Syst Informat ANSSI, Paris, France
[3] Nanyang Technol Univ, Singapore, Singapore
[4] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptanalysis; Higher Order Differential; Algebraic Attack; Filtered LFSR;
D O I
10.13154/tosc.v2018.i1.5-28
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a cryptanalysis of full KRAVATTE, an instantiation of the Farfalle construction of a pseudorandom function (PRF) with variable input and output length. This new construction, proposed by Bertoni et al., introduces an efficiently parallelizable and extremely versatile building block for the design of symmetric mechanisms, e.g. message authentication codes or stream ciphers. It relies on a set of permutations and on so-called rolling functions: it can be split into a compression layer followed by a two-step expansion layer. The key is expanded and used to mask the inputs and outputs of the construction. KRAVATTE instantiates Farfalle using linear rolling functions and permutations obtained by iterating the Keccak round function. We develop in this paper several attacks against this PRF, based on three different attack strategies that bypass part of the construction and target a reduced number of permutation rounds. A higher order differential distinguisher exploits the possibility to build an affine space of values in the cipher state after the compression layer. An algebraic meet-in-the-middle attack can be mounted on the second step of the expansion layer. Finally, due to the linearity of the rolling function and the low algebraic degree of the Keccak round function, a linear recurrence distinguisher can be found on intermediate states of the second step of the expansion layer. All the attacks rely on the ability to invert a small number of the final rounds of the construction. In particular, the last two rounds of the construction together with the final masking by the key can be algebraically inverted, which allows to recover the key. The complexities of the devised attacks, applied to the KRAVATTE specifications published on the IACR ePrint in July 2017, or the strengthened version of KRAVATTE recently presented at ECC 2017, are far below the security claimed.
引用
收藏
页码:5 / 28
页数:24
相关论文
共 50 条
  • [41] Quantum key-recovery attack on Feistel structures
    Xiaoyang Dong
    Xiaoyun Wang
    Science China Information Sciences, 2018, 61
  • [42] A Polynomial Time Key-Recovery Attack on the Sidon Cryptosystem
    Briaud, Pierre
    Tillich, Jean-Pierre
    Verbel, Javier
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 419 - 438
  • [43] Practical Key-Recovery for All Possible Parameters of SFLASH
    Bouillaguet, Charles
    Fouque, Pierre-Alain
    Macario-Rat, Gilles
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 667 - +
  • [44] Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks
    Santoso, Bagus
    Oohama, Yasutada
    Su, Chunhua
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 3 - 17
  • [45] Weak-keys and key-recovery attack for TinyJAMBU
    Dutta, Pranjal
    Rajasree, Mahesh Sreekumar
    Sarkar, Santanu
    SCIENTIFIC REPORTS, 2022, 12 (01):
  • [46] A Key-Recovery Attack on Authentication Watermarking by Li and Yuan
    Schaathun, Hans Georg
    MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, 2008, : 221 - 225
  • [47] A Key-Recovery Attack on 855-round Trivium
    Fu, Ximing
    Wang, Xiaoyun
    Dong, Xiaoyang
    Meier, Willi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 160 - 184
  • [48] New Key-Recovery Attack on Reduced-Round AES
    Bardeh, Navid Ghaedi
    Rijmen, Vincent
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 43 - 62
  • [49] A family of weak keys in HFE and the corresponding practical key-recovery
    Bouillaguet, Charles
    Fouque, Pierre-Alain
    Joux, Antoine
    Treger, Joana
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2011, 5 (3-4) : 247 - 275
  • [50] Key-Recovery Fault Injection Attack on the Classic McEliece KEM
    Pircher, Sabine
    Geier, Johannes
    Danner, Julian
    Mueller-Gritschneder, Daniel
    Wachter-Zeh, Antonia
    CODE-BASED CRYPTOGRAPHY, CBCRYPTO 2022, 2023, 13839 : 37 - 61