Improved Rebound Attack on the Finalist Grøstl
15 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Improved Rebound Attack on the Finalist Grøstl

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
15 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Improved Rebound Attack on the Finalist Grøstl Jérémy Jean1,?,??, María Naya-Plasencia2,?, and Thomas Peyrin3,? ? ? 1 École Normale Supérieure, France 2 University of Versailles, France 3 Nanyang Technological University, Singapore Abstract. Grøstl is one of the five finalist hash functions of the SHA-3 competition. For entering this final phase, the designers have tweaked the submitted versions. This tweak renders inapplicable the best known distinguishers on the compression function presented by Peyrin [18] that exploited the internal permutation properties. Since the beginning of the final round, very few analysis have been published on Grøstl. Currently, the best known rebound-based results on the permutation and the compression function for the 256-bit version work up to 8 rounds, and up to 7 rounds for the 512-bit version. In this paper, we present new rebound distinguishers that work on a higher number of rounds for the permutations of both 256 and 512-bit versions of this finalist, that is 9 and 10 respectively. Our distinguishers make use of an algorithm that we propose for solving three fully active states in the middle of the differential characteristic, while the Super-Sbox technique only handles two. Keywords: Hash Function, Cryptanalysis, SHA-3, Grøstl, Rebound Attack. 1 Introduction Hash functions are one of the main families in symmetric cryptography.

  • super-sbox technique

  • internal state

  • grøstl

  • improved rebound

  • using rebound-like

  • function using

  • like substitution-permutation

  • bit version

  • permutation


Sujets

Informations

Publié par
Nombre de lectures 12
Langue English

Extrait

ImprovedReboundAttackontheFinalistGrøstlJérémyJean1,?,??,MaríaNaya-Plasencia2,?,andThomasPeyrin3,???1ÉcoleNormaleSupérieure,France2UniversityofVersailles,France3NanyangTechnologicalUniversity,SingaporeAbstract.GrøstlisoneofthefivefinalisthashfunctionsoftheSHA-3competition.Forenteringthisfinalphase,thedesignershavetweakedthesubmittedversions.ThistweakrendersinapplicablethebestknowndistinguishersonthecompressionfunctionpresentedbyPeyrin[18]thatexploitedtheinternalpermutationproperties.Sincethebeginningofthefinalround,veryfewanalysishavebeenpublishedonGrøstl.Currently,thebestknownrebound-basedresultsonthepermutationandthecompressionfunctionforthe256-bitversionworkupto8rounds,andupto7roundsforthe512-bitversion.Inthispaper,wepresentnewrebounddistinguishersthatworkonahighernumberofroundsforthepermutationsofboth256and512-bitversionsofthisfinalist,thatis9and10respectively.Ourdistinguishersmakeuseofanalgorithmthatweproposeforsolvingthreefullyactivestatesinthemiddleofthedifferentialcharacteristic,whiletheSuper-Sboxtechniqueonlyhandlestwo.Keywords:HashFunction,Cryptanalysis,SHA-3,Grøstl,ReboundAttack.1IntroductionHashfunctionsareoneofthemainfamiliesinsymmetriccryptography.Theyarefunctionsthat,givenaninputofvariablelength,produceanoutputofafixedsize.Theyhavemanyimportantapplications,likeintegritycheckofexecutables,authentication,digitalsignatures.Since2005,severalnewattacksonhashfunctionshaveappeared.Inparticular,thehashstan-dardsMD5andSHA-1werecryptanalysedbyWangetal.[21,22].DuetotheresemblanceofthestandardSHA-2withSHA-1,theconfidenceintheformerhasalsobeensomewhatundermined.ThisiswhytheAmericanNationalInstituteofStandardsandTechnology(NIST)decidedtolaunchin2008acompetitionforfindinganewhashstandard,SHA-3.Thiscompetitionreceived64hashfunctionsubmissionsandaccepted51toenterthefirstround.Now,threeyearsandtworoundslater,only5hashfunctionsremaininthefinalphaseofthecompetition.Amongstthesefinalists,thereisonlyoneAES-basedfunction,thoughmanywereproposed.ThishashfunctionisGrøstl[2],andisattheoriginoftheintroductionofanewcryptanalysistechniquethathasbeenwidelydeployed,improvedandappliedtoalargenumberofSHA-3candidates,hashfunctionsandothertypesofconstructions.Thisnewtechnique,calledreboundattack,wasintroducedbyMendeletal.[11]andhasbecomeoneofthemostimportanttoolsusedtoanalyzethesecuritymarginofmanySHA-3candidatesaswellastheirbuildingblocks.AsforGrøstlitself,ithasbeenappliedandimprovedinseveraloccasions[3,12,13,15,18].GrøstlisundoubtedlyoneoftheSHA-3candidatesthathavereceivedthelargestamountofcryptanalysis.Whenenteringthefinalround,atweakofthefunctionwasproposed,whichpreventstheapplicationoftheattacksfrom[18];wedenoteGrøstl-0theoriginalsubmissionofthealgorithmandGrøstlitstweakedversion.Apartfromthereboundresults,theothermain?SupportedbytheFrenchAgenceNationaledelaRecherchethroughtheSAPHIR2projectunderContractANR-08-VERS-014.??SupportedbytheFrenchDélégationGénéralepourl’Armement(DGA).???TheauthorissupportedbytheLeeKuanYewPostdoctoralFellowship2011andtheSingaporeNationalResearchFoundationFellowship2012.
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents