International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations

Authors:
Zhongfeng Niu , University of Chinese Academy of Sciences
Kai Hu , Shandong University
Siwei Sun , University of Chinese Academy of Sciences
Zhiyu Zhang , University of Chinese Academy of Sciences
Meiqin Wang , Shandong University
Download:
DOI: 10.1007/978-3-031-68385-5_3 (login may be required)
Search ePrint
Search Google
Presentation: Slides
Conference: CRYPTO 2024
Abstract: We present a framework for speeding up the search for preimages of candidate one-way functions based on highly biased differential-linear distinguishers. It is naturally applicable to preimage attacks on hash functions. Further, a variant of this framework applied to keyed functions leads to accelerated key-recovery attacks. Interestingly, our technique is able to exploit related-key differential-linear distinguishers in the single-key model without querying the target encryption oracle with unknown but related keys. This is in essence similar to how we speed up the key search based on the well known complementation property of DES, which calls for caution from the designers in building primitives meant to be secure in the single-key setting without a thorough cryptanalysis in the related-key model. We apply the method to sponge-based hash function Ascon-HASH, XOFs XOEsch/Ascon-XOF and AEAD Schwaemm, etc. Accelerated preimage or key-recovery attacks are obtained. Note that all the differential-linear distinguishers employed in this work are highly biased and thus can be experimentally verified.
BibTeX
@inproceedings{crypto-2024-34332,
  title={Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations},
  publisher={Springer-Verlag},
  doi={10.1007/978-3-031-68385-5_3},
  author={Zhongfeng Niu and Kai Hu and Siwei Sun and Zhiyu Zhang and Meiqin Wang},
  year=2024
}