Exploring differential-based distinguishers and forgeries for ascon

Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with different performance profiles are appearing....

Full description

Saved in:
Bibliographic Details
Main Authors: Gerault, David, Peyrin, Thomas, Tan, Quan Quan
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2022
Subjects:
Online Access:https://hdl.handle.net/10356/162578
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-162578
record_format dspace
spelling sg-ntu-dr.10356-1625782023-02-28T20:09:14Z Exploring differential-based distinguishers and forgeries for ascon Gerault, David Peyrin, Thomas Tan, Quan Quan School of Physical and Mathematical Sciences Science::Mathematics Differential Cryptanalysis Constraint Programming Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with different performance profiles are appearing. In this article, we explore the use of Constraint Programming (CP) for differential cryptanalysis on the Ascon authenticated encryption family (first choice of the CAESAR lightweight applications portfolio and current finalist of the NIST LWC competition) and its internal permutation. We first present a search methodology for finding differential characteristics for Ascon with CP, which can easily find the best differential characteristics already reported by the Ascon designers. This shows the capability of CP in generating easily good differential results compared to dedicated search heuristics. Based on our tool, we also parametrize the search strategies in CP to generate other differential characteristics with the goal of forming limited-birthday distinguishers for 4, 5, 6 and 7 rounds and rectangle attacks for 4 and 5 rounds of the Ascon internal permutation. We propose a categorization of the distinguishers into black-box and non-black-box to better differentiate them as they are often useful in different contexts. We also obtained limited-birthday distinguishers which represent currently the best known distinguishers for 4, 5 and 6 rounds under the category of non-black-box distinguishers. Leveraging again our tool, we have generated forgery attacks against both reduced-rounds Ascon-128 and Ascon-128A, improving over the best reported results at the time of writing. Finally, using the best differential characteristic we have found for 2 rounds, we could also improve a recent attack on round-reduced Ascon-HAsh. Agency for Science, Technology and Research (A*STAR) Published version The authors are supported by the Temasek Laboratories. 2022-10-31T04:40:51Z 2022-10-31T04:40:51Z 2021 Journal Article Gerault, D., Peyrin, T. & Tan, Q. Q. (2021). Exploring differential-based distinguishers and forgeries for ascon. IACR Transactions On Symmetric Cryptology, 2021(3), 102-136. https://dx.doi.org/10.46586/tosc.v2021.i3.102-136 2519-173X https://hdl.handle.net/10356/162578 10.46586/tosc.v2021.i3.102-136 2-s2.0-85119936071 3 2021 102 136 en IACR Transactions on Symmetric Cryptology © 2021 David Gerault, Thomas Peyrin, Quan Quan Tan. This work is licensed under a Creative Commons Attribution 4.0 International License. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Science::Mathematics
Differential Cryptanalysis
Constraint Programming
spellingShingle Science::Mathematics
Differential Cryptanalysis
Constraint Programming
Gerault, David
Peyrin, Thomas
Tan, Quan Quan
Exploring differential-based distinguishers and forgeries for ascon
description Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with different performance profiles are appearing. In this article, we explore the use of Constraint Programming (CP) for differential cryptanalysis on the Ascon authenticated encryption family (first choice of the CAESAR lightweight applications portfolio and current finalist of the NIST LWC competition) and its internal permutation. We first present a search methodology for finding differential characteristics for Ascon with CP, which can easily find the best differential characteristics already reported by the Ascon designers. This shows the capability of CP in generating easily good differential results compared to dedicated search heuristics. Based on our tool, we also parametrize the search strategies in CP to generate other differential characteristics with the goal of forming limited-birthday distinguishers for 4, 5, 6 and 7 rounds and rectangle attacks for 4 and 5 rounds of the Ascon internal permutation. We propose a categorization of the distinguishers into black-box and non-black-box to better differentiate them as they are often useful in different contexts. We also obtained limited-birthday distinguishers which represent currently the best known distinguishers for 4, 5 and 6 rounds under the category of non-black-box distinguishers. Leveraging again our tool, we have generated forgery attacks against both reduced-rounds Ascon-128 and Ascon-128A, improving over the best reported results at the time of writing. Finally, using the best differential characteristic we have found for 2 rounds, we could also improve a recent attack on round-reduced Ascon-HAsh.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Gerault, David
Peyrin, Thomas
Tan, Quan Quan
format Article
author Gerault, David
Peyrin, Thomas
Tan, Quan Quan
author_sort Gerault, David
title Exploring differential-based distinguishers and forgeries for ascon
title_short Exploring differential-based distinguishers and forgeries for ascon
title_full Exploring differential-based distinguishers and forgeries for ascon
title_fullStr Exploring differential-based distinguishers and forgeries for ascon
title_full_unstemmed Exploring differential-based distinguishers and forgeries for ascon
title_sort exploring differential-based distinguishers and forgeries for ascon
publishDate 2022
url https://hdl.handle.net/10356/162578
_version_ 1759858298497007616