2020
DOI: 10.46586/tosc.v2020.i3.1-45
|View full text |Cite
|
Sign up to set email alerts
|

Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

Abstract: While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs require optimization with respect to a different metric: arithmetic complexity.In this paper we study the design of secure cryptographic algorithms optimized to minimize this metric. We begin by identifying the differences in the design space between such arit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 63 publications
(26 citation statements)
references
References 19 publications
0
25
0
1
Order By: Relevance
“…Our analysis of STARK-friendly primitives clearly shows that the concrete instances of GMiMC and HadesMiMC proposed in the StarkWare challenges present several major weaknesses, independently from the choice of the underlying finite field. At a first glance, the third contender involved in the challenges, namely Vision for the binary field and Rescue for the prime fields [7], seems more resistant to the cryptanalytic techniques we have used against the other two primitives. This seems rather expected since Vision and Rescue follow a more classical SPN construction with full Sbox layers; for similar parameters, they include a larger number of Sboxes which may prevent them from the unsuitable behaviours we have exhibited on the other primitives.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Our analysis of STARK-friendly primitives clearly shows that the concrete instances of GMiMC and HadesMiMC proposed in the StarkWare challenges present several major weaknesses, independently from the choice of the underlying finite field. At a first glance, the third contender involved in the challenges, namely Vision for the binary field and Rescue for the prime fields [7], seems more resistant to the cryptanalytic techniques we have used against the other two primitives. This seems rather expected since Vision and Rescue follow a more classical SPN construction with full Sbox layers; for similar parameters, they include a larger number of Sboxes which may prevent them from the unsuitable behaviours we have exhibited on the other primitives.…”
Section: Discussionmentioning
confidence: 99%
“…One example of such a use case is the zero-knowledge proof system deployed in the Zcash cryptocurrency. Another very interesting example is the ZK-STARK protocol [13], which is expected to be deployed on top of the Ethereum blockchain within the next year: it uses as a building-block a collision-resistant hash function, and the performance of the proof system highly depends on the number of arithmetic operations required for describing the hash function (see [7] for details).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Considering that the inversion operation over normalF2n is acausal computation [16], we will use zero‐knowledge proof to perform the inversion operation. In this case of zero‐knowledge proofs, the particular variant of acausal computation is known as non‐determinism.…”
Section: High‐order Aes Maskmentioning
confidence: 99%
“…There are two ways to find the inverse of the Galois field GnormalF28, one is to find its inverse element in a pre‐designed table, the other is to use power operation. In [16], the authors use the principle of zero‐knowledge proof to carry out the inverse operation, which reduces the number of times of multiplication calculation to 2. In this study, a high‐order mask based on zero‐knowledge proof is designed to mask the inversion process.…”
Section: Introductionmentioning
confidence: 99%