Automatic preimage attack framework on Ascon using a linearize-and-guess approach
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon. The preimage attack framework, utilizing the linear structure with the allocating model, was initially proposed by Guo et al....
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/172379 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-172379 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1723792023-12-11T15:34:27Z Automatic preimage attack framework on Ascon using a linearize-and-guess approach Li, Huina He, Le Chen, Shiyao Guo, Jian Qiu, Weidong School of Physical and Mathematical Sciences Strategic Centre for Research in Privacy-Preserving Technologies & Systems (SCRIPTS) Library and information science::Cryptography Preimage Attack Ascon Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon. The preimage attack framework, utilizing the linear structure with the allocating model, was initially proposed by Guo et al. at ASIACRYPT 2016 and subsequently improved by Li et al. at EUROCRYPT 2019, demonstrating high effectiveness in breaking the preimage resistance of Keccak. In this paper, we extend this preimage attack framework to Ascon from two aspects. Firstly, we propose a linearize-and-guess approach by analyzing the algebraic properties of the Ascon permutation. As a result, the complexity of finding a preimage for 2-round Ascon-Xof with a 64-bit hash value can be significantly reduced from 2^39 guesses to 2^27.56 guesses. To support the effectiveness of our approach, we find an actual preimage of all ‘0’ hash in practical time. Secondly, we develop a SAT-based automatic preimage attack framework using the linearize-and-guess approach, which is efficient to search for the optimal structures exhaustively. Consequently, we present the best theoretical preimage attacks on 3-round and 4-round Ascon-Xof so far. Ministry of Education (MOE) Nanyang Technological University National Research Foundation (NRF) Published version This research is supported by the National Natural Science Foundation of China under (Grants No.61972249), Nanyang Technological University in Singapore under Start-up Grant 04INS000397C230, and Ministry of Education in Singapore under Grants RG91/20, the National Research Foundation, Singapore under its Strategic Capability Research Centres Funding Initiative, the State Scholarship Fund (No.202106230206) organized by China Scholarship Council. 2023-12-08T07:21:34Z 2023-12-08T07:21:34Z 2023 Journal Article Li, H., He, L., Chen, S., Guo, J. & Qiu, W. (2023). Automatic preimage attack framework on Ascon using a linearize-and-guess approach. IACR Transactions On Symmetric Cryptology, 2023(3), 74-100. https://dx.doi.org/10.46586/tosc.v2023.i3.74-100 2519-173X https://hdl.handle.net/10356/172379 10.46586/tosc.v2023.i3.74-100 3 2023 74 100 en 04INS000397C230 RG91/20 02106230206 IACR Transactions on Symmetric Cryptology © 2023 Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu. This work is licensed under a Creative Commons Attribution 4.0 International License. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Library and information science::Cryptography Preimage Attack Ascon |
spellingShingle |
Library and information science::Cryptography Preimage Attack Ascon Li, Huina He, Le Chen, Shiyao Guo, Jian Qiu, Weidong Automatic preimage attack framework on Ascon using a linearize-and-guess approach |
description |
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon. The preimage attack framework, utilizing the linear structure with the allocating model, was initially proposed by Guo et al. at ASIACRYPT 2016 and subsequently improved by Li et al. at EUROCRYPT 2019, demonstrating high effectiveness in breaking the preimage resistance of Keccak. In this paper, we extend this preimage attack framework to Ascon from two aspects. Firstly, we propose a linearize-and-guess approach by analyzing the algebraic properties of the Ascon permutation. As a result, the complexity of finding a preimage for 2-round Ascon-Xof with a 64-bit hash value can be significantly reduced from 2^39 guesses to 2^27.56 guesses. To support the effectiveness of our approach, we find an actual preimage of all ‘0’ hash in practical time. Secondly, we develop a SAT-based automatic preimage attack framework using the linearize-and-guess approach, which is efficient to search for the optimal structures exhaustively. Consequently, we present the best theoretical preimage attacks on 3-round and 4-round Ascon-Xof so far. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Li, Huina He, Le Chen, Shiyao Guo, Jian Qiu, Weidong |
format |
Article |
author |
Li, Huina He, Le Chen, Shiyao Guo, Jian Qiu, Weidong |
author_sort |
Li, Huina |
title |
Automatic preimage attack framework on Ascon using a linearize-and-guess approach |
title_short |
Automatic preimage attack framework on Ascon using a linearize-and-guess approach |
title_full |
Automatic preimage attack framework on Ascon using a linearize-and-guess approach |
title_fullStr |
Automatic preimage attack framework on Ascon using a linearize-and-guess approach |
title_full_unstemmed |
Automatic preimage attack framework on Ascon using a linearize-and-guess approach |
title_sort |
automatic preimage attack framework on ascon using a linearize-and-guess approach |
publishDate |
2023 |
url |
https://hdl.handle.net/10356/172379 |
_version_ |
1787136418348269568 |