International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Key Rank Estimation Methods: Comparisons and Practical Considerations

Authors:
Rebecca Hay , University of Bristol
Elisabeth Oswald , University of Klagenfurt, University of Birmingham
Download:
DOI: 10.62056/aytxl86bm
URL: https://cic.iacr.org//p/1/3/34
Search ePrint
Search Google
Abstract:

New proposals for scalable key rank estimation methods have appeared recently, in particular the sampling based approach MCRank. The idea is that one can consistently estimate the key rank by sampling only a small portion of the key space as a “proxy”, leading to both an accurate and scalable approach, at least in comparison with another approach based on histograms. We show that the (earlier) GEEA algorithm is in fact a sampling based algorithm, and provide an in-depth comparison between GEEA (when adapted to produce rank estimates rather than guessing entropy estimates), GM bounds, MCRank and the currently most performant counting based rank estimation as implemented in the Labynkyr library. We find that although MCRank does live up to the promised accuracy and scalability for probability-based distinguishers, it fails to handle cases with unusual distinguisher distributions.

Furthermore, we put forward a novel proposal for a highly scalable key rank estimation method by introducing the notion of an “attacker budget”. Our proposal is based on the idea that, in particular for very long keys, the exact key rank is less important than the knowledge whether a key is within a certain bound. Thus our “budget approach” is based on efficiently checking if the result of an attack is such that the attacker's budget suffices for successful enumeration. Our budget approach scales linearly with the key size and thus enables security estimations even for post-quantum key lengths.

BibTeX
@article{cic-2024-34845,
  title={Key Rank Estimation Methods: Comparisons and Practical Considerations},
  journal={cic},
  publisher={International Association for Cryptologic Research},
  volume={1, Issue 3},
  url={https://cic.iacr.org//p/1/3/34},
  doi={10.62056/aytxl86bm},
  author={Rebecca Hay and Elisabeth Oswald},
  year=2024
}