首页> 外文会议>International conference on the theory and application of cryptology and information security >New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions
【24h】

New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions

机译:新的MILP建模:改进基于Keccak的结构的条件立方体攻击

获取原文

摘要

In this paper, we propose a new MILP modeling to find better or even optimal choices of conditional cubes, under the general framework of conditional cube attacks. These choices generally find new or improved attacks against the keyed constructions based on Keccak permutation and its variants, including Keccak-MAC, KMAC, Keyak, and Ketje, in terms of attack complexities or the number of attacked rounds. Interestingly, conditional cube attacks were applied to round-reduced Keccak-MAC, but not to KMAC despite the great similarity between Keccak-MAC and KMAC, and the fact that KMAC is the NIST standard way of constructing MAC from SHA-3. As examples to demonstrate the effectiveness of our new modeling, we report key recovery attacks against KMAC128 and KMAC256 reduced to 7 and 9 rounds, respectively; the best attack against Lake Keyak with 128-bit key is improved from 6 to 8 rounds in the nonce-respected setting and 9 rounds of Lake Keyak can be attacked if the key size is of 256 bits; attack complexity improvements are found generally on other constructions. Our new model is also applied to keccak-based full-state keyed sponge and gives a positive answer to the open question proposed by Bertoni et al. whether cube attacks can be extended to more rounds by exploiting full-state absorbing. To verify the correctness of our attacks, reduced-variants of the attacks are implemented and verified on a PC practically. It is remarked that this work does not threaten the security of any full version of the instances analyzed in this paper.
机译:在本文中,我们提出了一种新的核查模型,以便在条件立方体攻击的一般框架下找到有条件立方体的更好甚至最佳选择。这些选择通常在基于Keccak排列及其变体的基于Keccak-Mac,Kmac,Keyak和Ketje的基于Keccak-Mac,KMAC,Keetje的基于Keccak-Mac,KMAC,Keetje的新的或改进攻击。有趣的是,条件立方体攻击被应用于圆形减少的Keccak-Mac,但尽管KECCAK-MAC和KMAC之间存在巨大相似,但KMAC是从SHA-3构建MAC的NIST标准方式。作为展示我们新建模的有效性的示例,我们报告了对抗KMAC128和KMAC256的关键恢复攻击分别减少到7和9轮;与128位钥匙的keyak湖keyak的最佳攻击从6到8轮改进,在键尺寸为256位,9轮keyak可以受到攻击;攻击复杂性改进通常在其他结构上发现。我们的新模型也适用于基于Keccak的全态键控海绵,并为Bertoni等人提出的开放问题提供了积极的答案。通过利用全状态吸收,多维数据集攻击是否可以扩展到更多轮次。为了验证我们的攻击的正确性,实际上在PC上实现并验证了攻击的减少变体。据称,这项工作不会威胁到本文分析的任何完整版本的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号