2020
DOI: 10.1007/978-3-030-56877-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems

Abstract: The security and performance of many integrity proof systems like SNARKs, STARKs and Bulletproofs highly depend on the underlying hash function. For this reason several new proposals have recently been developed. These primitives obviously require an in-depth security evaluation, especially since their implementation constraints have led to less standard design approaches. This work compares the security levels offered by two recent families of such primitives, namely GMiMC and HadesMiMC. We exhibit low-comple… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Other Statistical Attacks The low differential probability protects Arion and ArionHash against classical and truncated differential attacks. We conclude that the full diffusion after two rounds protects Arion and ArionHash against impossible differential and zero-correlation attacks [14], boomerang attack [50], integral attack [11,21], multiple-of-n and mixture differential attacks [31,36]. Note that we mainly perform cryptanalysis for ensuring the security for the parameters that are suitbale for target applications.…”
Section: Definition 8 (See [5 Definition 6 15]mentioning
confidence: 98%
See 1 more Smart Citation
“…Other Statistical Attacks The low differential probability protects Arion and ArionHash against classical and truncated differential attacks. We conclude that the full diffusion after two rounds protects Arion and ArionHash against impossible differential and zero-correlation attacks [14], boomerang attack [50], integral attack [11,21], multiple-of-n and mixture differential attacks [31,36]. Note that we mainly perform cryptanalysis for ensuring the security for the parameters that are suitbale for target applications.…”
Section: Definition 8 (See [5 Definition 6 15]mentioning
confidence: 98%
“…Our findings in Table 5 suggest that after two rounds Arion-π has already almost full density over F p . Higher-order differential attacks [11,39,40] exploit that higher differentials will vanish at some point. Since Arion achieves degrees greater than or equal to q − 2 in the input variables we expect Arion to resist against higher-order differentials and distinguishers.…”
Section: Algebraic Attacksmentioning
confidence: 99%
“…Number of rounds of GMiMC-erf: For full-data scenario, the designers [2, Table 2] take R T D ≥ 1 + t + (t 2 + t) × n 2(n−1) rounds to provide the resistance against truncated differential attacks for multivariate case under single-key setting. This bound then has been broken and extended to t(t − 2) rounds by Beyne et al [7]. For low-data scenario, an attacker has limited data access, that is given only one or two known plaintext-ciphertext pairs for the cryptanalysis, thus designers mainly consider Greatest Common Divisors (GCD) and Gröbner Basis attacks, the number of rounds to provide security is…”
Section: Specifications Of Gmimcmentioning
confidence: 99%
“…Contributions. On one hand, we investigate the potential threats of the relatedkey attacks for GMiMC-erf 7 when deployed as PRP/PRFs in the post-quantum signature schemes, which is the recommended version of GMiMC and aims at competing with LowMC in post-quantum signature applications.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation