Automatic preimage attack framework on Ascon using a linearize-and-guess approach

Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon. The preimage attack framework, utilizing the linear structure with the allocating model, was initially proposed by Guo et al....

Full description

Saved in:
Bibliographic Details
Main Authors: Li, Huina, He, Le, Chen, Shiyao, Guo, Jian, Qiu, Weidong
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2023
Subjects:
Online Access:https://hdl.handle.net/10356/172379
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-172379
record_format dspace
spelling sg-ntu-dr.10356-1723792023-12-11T15:34:27Z Automatic preimage attack framework on Ascon using a linearize-and-guess approach Li, Huina He, Le Chen, Shiyao Guo, Jian Qiu, Weidong School of Physical and Mathematical Sciences Strategic Centre for Research in Privacy-Preserving Technologies & Systems (SCRIPTS) Library and information science::Cryptography Preimage Attack Ascon Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon. The preimage attack framework, utilizing the linear structure with the allocating model, was initially proposed by Guo et al. at ASIACRYPT 2016 and subsequently improved by Li et al. at EUROCRYPT 2019, demonstrating high effectiveness in breaking the preimage resistance of Keccak. In this paper, we extend this preimage attack framework to Ascon from two aspects. Firstly, we propose a linearize-and-guess approach by analyzing the algebraic properties of the Ascon permutation. As a result, the complexity of finding a preimage for 2-round Ascon-Xof with a 64-bit hash value can be significantly reduced from 2^39 guesses to 2^27.56 guesses. To support the effectiveness of our approach, we find an actual preimage of all ‘0’ hash in practical time. Secondly, we develop a SAT-based automatic preimage attack framework using the linearize-and-guess approach, which is efficient to search for the optimal structures exhaustively. Consequently, we present the best theoretical preimage attacks on 3-round and 4-round Ascon-Xof so far. Ministry of Education (MOE) Nanyang Technological University National Research Foundation (NRF) Published version This research is supported by the National Natural Science Foundation of China under (Grants No.61972249), Nanyang Technological University in Singapore under Start-up Grant 04INS000397C230, and Ministry of Education in Singapore under Grants RG91/20, the National Research Foundation, Singapore under its Strategic Capability Research Centres Funding Initiative, the State Scholarship Fund (No.202106230206) organized by China Scholarship Council. 2023-12-08T07:21:34Z 2023-12-08T07:21:34Z 2023 Journal Article Li, H., He, L., Chen, S., Guo, J. & Qiu, W. (2023). Automatic preimage attack framework on Ascon using a linearize-and-guess approach. IACR Transactions On Symmetric Cryptology, 2023(3), 74-100. https://dx.doi.org/10.46586/tosc.v2023.i3.74-100 2519-173X https://hdl.handle.net/10356/172379 10.46586/tosc.v2023.i3.74-100 3 2023 74 100 en 04INS000397C230 RG91/20 02106230206 IACR Transactions on Symmetric Cryptology © 2023 Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu. This work is licensed under a Creative Commons Attribution 4.0 International License. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Library and information science::Cryptography
Preimage Attack
Ascon
spellingShingle Library and information science::Cryptography
Preimage Attack
Ascon
Li, Huina
He, Le
Chen, Shiyao
Guo, Jian
Qiu, Weidong
Automatic preimage attack framework on Ascon using a linearize-and-guess approach
description Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon. The preimage attack framework, utilizing the linear structure with the allocating model, was initially proposed by Guo et al. at ASIACRYPT 2016 and subsequently improved by Li et al. at EUROCRYPT 2019, demonstrating high effectiveness in breaking the preimage resistance of Keccak. In this paper, we extend this preimage attack framework to Ascon from two aspects. Firstly, we propose a linearize-and-guess approach by analyzing the algebraic properties of the Ascon permutation. As a result, the complexity of finding a preimage for 2-round Ascon-Xof with a 64-bit hash value can be significantly reduced from 2^39 guesses to 2^27.56 guesses. To support the effectiveness of our approach, we find an actual preimage of all ‘0’ hash in practical time. Secondly, we develop a SAT-based automatic preimage attack framework using the linearize-and-guess approach, which is efficient to search for the optimal structures exhaustively. Consequently, we present the best theoretical preimage attacks on 3-round and 4-round Ascon-Xof so far.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Li, Huina
He, Le
Chen, Shiyao
Guo, Jian
Qiu, Weidong
format Article
author Li, Huina
He, Le
Chen, Shiyao
Guo, Jian
Qiu, Weidong
author_sort Li, Huina
title Automatic preimage attack framework on Ascon using a linearize-and-guess approach
title_short Automatic preimage attack framework on Ascon using a linearize-and-guess approach
title_full Automatic preimage attack framework on Ascon using a linearize-and-guess approach
title_fullStr Automatic preimage attack framework on Ascon using a linearize-and-guess approach
title_full_unstemmed Automatic preimage attack framework on Ascon using a linearize-and-guess approach
title_sort automatic preimage attack framework on ascon using a linearize-and-guess approach
publishDate 2023
url https://hdl.handle.net/10356/172379
_version_ 1787136418348269568