Practical Cube Attack against Nonce-Misused Ascon

IF 1.7 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING IACR Transactions on Symmetric Cryptology Pub Date : 2022-12-07 DOI:10.46586/tosc.v2022.i4.120-144
Jules Baudrin, A. Canteaut, Léo Perrin
{"title":"Practical Cube Attack against Nonce-Misused Ascon","authors":"Jules Baudrin, A. Canteaut, Léo Perrin","doi":"10.46586/tosc.v2022.i4.120-144","DOIUrl":null,"url":null,"abstract":"Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort. As this competition comes to an end, we analyse the security of this algorithm against cube attacks. We present a practical cube attack against the full 6-round encryption in Ascon in the nonce-misuse setting. We note right away that this attack does not violate the security claims made by the designers of Ascon, due to this setting.Our cryptanalysis is a conditional cube attack that is capable of recovering the full capacity in practical time; but for Ascon-128, its extension to a key recovery or a forgery is still an open question. First, a careful analysis of the maximum-degree terms in the algebraic normal form of the Ascon permutation allows us to derive linear equations in half of the capacity bits given enough cube sums of dimension 32. Then, depending on the results of this first phase, we identify smaller-degree cubes that allow us to recover the remaining half of the capacity. Overall, our cryptanalysis has a complexity of about 240 adaptatively chosen plaintexts, and about 240 calls to the permutation. We have implemented the full attack and our experiments confirm our claims.Our results are built on a theoretical framework which allows us to easily identify monomials whose cube-sums provide linear equations in the capacity bits. The coefficients of these monomials have a more general form than those used in the previous attacks against Ascon, and our method enables us to re-frame previous results in a simpler form. Overall, it enables to gain a deeper understanding of the properties of the permutation, and in particular of its S-box, that make such state-recoveries possible.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"48 1","pages":"120-144"},"PeriodicalIF":1.7000,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IACR Transactions on Symmetric Cryptology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46586/tosc.v2022.i4.120-144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 10

Abstract

Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort. As this competition comes to an end, we analyse the security of this algorithm against cube attacks. We present a practical cube attack against the full 6-round encryption in Ascon in the nonce-misuse setting. We note right away that this attack does not violate the security claims made by the designers of Ascon, due to this setting.Our cryptanalysis is a conditional cube attack that is capable of recovering the full capacity in practical time; but for Ascon-128, its extension to a key recovery or a forgery is still an open question. First, a careful analysis of the maximum-degree terms in the algebraic normal form of the Ascon permutation allows us to derive linear equations in half of the capacity bits given enough cube sums of dimension 32. Then, depending on the results of this first phase, we identify smaller-degree cubes that allow us to recover the remaining half of the capacity. Overall, our cryptanalysis has a complexity of about 240 adaptatively chosen plaintexts, and about 240 calls to the permutation. We have implemented the full attack and our experiments confirm our claims.Our results are built on a theoretical framework which allows us to easily identify monomials whose cube-sums provide linear equations in the capacity bits. The coefficients of these monomials have a more general form than those used in the previous attacks against Ascon, and our method enables us to re-frame previous results in a simpler form. Overall, it enables to gain a deeper understanding of the properties of the permutation, and in particular of its S-box, that make such state-recoveries possible.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
实用立方体攻击对非滥用Ascon
Ascon是一种基于海绵的具有关联数据的身份验证加密,它被选为CAESAR竞赛的获胜者之一,也是NIST轻量级加密标准化工作的决赛选手之一。随着比赛的结束,我们分析了该算法对立方体攻击的安全性。我们提出了一种实用的立方体攻击,针对Ascon在非误用设置下的全6轮加密。我们立即注意到,由于这个设置,这次攻击并没有违反Ascon设计者所声称的安全声明。我们的密码分析是一种条件立方体攻击,能够在实际时间内恢复全部容量;但对于Ascon-128来说,其扩展到密钥恢复或伪造仍然是一个悬而未决的问题。首先,对Ascon置换的代数范式中的最大次项进行仔细分析,使我们能够在给定足够的32维立方和的一半容量位中推导出线性方程。然后,根据第一阶段的结果,我们确定较小的多维数据集,使我们能够恢复剩余的一半容量。总的来说,我们的密码分析具有大约240个自适应选择明文的复杂性,以及大约240个对排列的调用。我们已经实施了完整的攻击,我们的实验证实了我们的说法。我们的结果建立在一个理论框架上,该框架使我们能够轻松地识别单项式,其立方和在容量位中提供线性方程。这些单项式的系数比以前针对Ascon的攻击中使用的系数具有更一般的形式,并且我们的方法使我们能够以更简单的形式重新构建以前的结果。总的来说,它使我们能够更深入地了解排列的性质,特别是它的s盒,使这种状态恢复成为可能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IACR Transactions on Symmetric Cryptology
IACR Transactions on Symmetric Cryptology Mathematics-Applied Mathematics
CiteScore
5.50
自引率
22.90%
发文量
37
期刊最新文献
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing Revisiting Yoyo Tricks on AES Key Committing Security of AEZ and More Related-Key Differential Analysis of the AES Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1