【24h】

Key-Recovery Attacks on ASASA

机译:对ASASA的密钥恢复攻击

获取原文

摘要

The ASASA construction is a new design scheme introduced at Asiacrypt 2014 by Biruykov, Bouillaguet and Khovratovich. Its versatility was illustrated by building two public-key encryption schemes, a secret-key scheme, as well as super S-box subcomponents of a white-box scheme. However one of the two public-key cryptosystems was recently broken at Crypto 2015 by Gilbert, Plut and Treger. As our main contribution, we propose a new algebraic key-recovery attack able to break at once the secret-key scheme as well as the remaining public-key scheme, in time complexity 2~(63) and 2~(39) respectively (the security parameter is 128 bits in both cases). Furthermore, we present a second attack of independent interest on the same public-key scheme, which heuristically reduces its security to solving an LPN instance with tractable parameters. This allows key recovery in time complexity 2~(56). Finally, as a side result, we outline a very efficient heuristic attack on the white-box scheme, which breaks an instance claiming 64 bits of security under one minute on a single desktop computer.
机译:ASASA的施工是Biruykov,Bouillaguet和Khovratovich在Asiacrypt 2014上提出的新设计方案。通过构建两个公用密钥加密方案,一个秘密密钥方案以及一个白盒方案的超级S盒子组件,说明了它的多功能性。但是,最近在Gilbert,Plut和Treger的Crypto 2015大会上打破了两个公钥密码系统之一。作为我们的主要贡献,我们提出了一种新的代数密钥恢复攻击,该攻击可以立即打破秘密密钥方案以及其余的公共密钥方案,时间复杂度分别为2〜(63)和2〜(39)(在两种情况下,安全性参数均为128位)。此外,我们提出了对同一公钥方案的第二次具有独立利益的攻击,从而启发式地降低了其安全性,从而无法解决具有易处理参数的LPN实例。这使得密钥恢复的时间复杂度为2〜(56)。最后,作为一个附带的结果,我们概述了对白盒方案的一种非常有效的启发式攻击,该攻击可以在一分钟内在一台台式计算机上破坏一个声称64位安全性的实例。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号