3 research outputs found
Where are the constants? New Insights On The Role of Round Constant Addition in The SymSum Distinguisher
The current work makes a systematic attempt to describe the effect of the relative order of round constant ( RCon) addition in the round function of an SPN cipher on its algebraic structure. The observations are applied to the SymSum distinguisher, introduced by Saha et al. in FSE 2017 which is one of the best distinguishers on the SHA3 hash function reported in literature. Results show that certain ordering (referred to as Type-LCN) of RCon makes the distinguisher less effective but it still works with some limitations. Results in the form of new SymSum distinguishers are reported on concrete Type-LCN constructions - NIST LWC competition finalist Xoodyak-Hash and its internal permutation Xoodoo. New linear structures are also reported on Xoodoo that augment the distinguisher to penetrate more rounds. Final results include SymSum distinguishers on 7 rounds of Xoodoo and 5 rounds of Xoodyak-Hash with complexity 2^128 and 2^32 , respectively. All practical distinguishers have been verified. The characterization encompassing the algebraic structure
and effect of RCon provided by the current work improves the under-
standing of SymSum in general and constitutes one of the first such result on Xoodyak-Hash and Xoodoo
TIDAL: Practical Collisions on State-Reduced Keccak Variants
An important tool that has contributed to collision search
on Keccak/SHA3 is the Target Difference Algorithm (TDA) and its inter-
nal differential counterpart Target Internal Difference Algorithm (TIDA),
which were introduced by Dinur et al. in separate works in FSE 2012 and
2013 respectively. These algorithms provide an ingenious way of extend-
ing the differential trails by one round and exploiting the affine subspaces
generated due to the low algebraic degree of the Keccak S-box. The cur-
rent work introduces TIDAL, which can extend TIDA by one more round
capitalizing on linearization techniques introduced by Guo et al. in JoC.
This approach requires increment consistency checks, which is also im-
proved in this work. The TIDAL strategy, in conjunction with a determin-
istic internal differential trail, has been applied to Keccak variants up to
400-bit state-size and leads to practical collision attacks for most of them
up to 5 rounds. In particular collisions have been confirmed for 4-round
Keccak[136, 64] with a complexity of 220 and on 6-round of Keccak[84,16]
with a complexity of 25 . Further, this work completely characterizes all
collision attacks on state-reduced variants, showcasing that TIDAL covers
most space up to 5 rounds. As state and round-reduced Keccak variants
are used to realize the internal states of many crypto primitives, the re-
sults presented here generate a significant impact. Finally, it shows new
directions for the long-standing problem of state-reduced variants being
difficult to be attacked
Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash
Higher order differential properties constitute a very insightful tool at the hands
of a cryptanalyst allowing for probing a cryptographic primitive from an algebraic perspective. In FSE 2017, Saha et al. reported SymSum (referred to as
SymSum_Vec in this paper), a new distinguisher based on higher order vectorial
Boolean derivatives of SHA-3, constituting one of the best distinguishers on the
latest cryptographic hash standard. SymSum_Vec exploits the difference in the
algebraic degree of highest degree monomials in the algebraic normal form of
SHA-3 with regards to their dependence on round constants. Later in Africacrypt
2020, Suryawanshi et al. extended SymSum_Vec using linearization techniques and
in SSS 2023 also applied it to NIST-LWC finalist Xoodyak. However, a major
limitation of SymSum_Vec is the maximum attainable derivative (MAD) which is
less than half of the widely studied ZeroSum distinguisher. This is attributed
to SymSum_Vec being dependent on m−fold vectorial derivatives while ZeroSum
relies on m−fold simple derivatives. In this work we overcome this limitation
of SymSum_Vec by developing and validating the theory of computing SymSum_Vec
with simple derivatives. This gives us a close to 100% improvement in the MAD
that can be computed. The new distinguisher reported in this work can also be combined with one/two-round linearization to penetrate more rounds. Moreover, we identify an issue with the two-round linearization claim made by Suryawanshi et al. which renders it invalid and also furnish an algebraic fix at the cost of some additional constraints.
Combining all results we report SymSum_Sim , a new variant of the SymSum_Vec
distinguisher based on m−fold simple derivatives that outperforms ZeroSum by
a factor of , for 10-round SHA-3-384 and 9-round SHA-3-512 respectively while enjoying the same MAD as ZeroSum. For every other SHA-3 variant,
SymSum_Sim maintains an advantage of factor 2. Combined with one/two-round
linearization, SymSum_Sim improves upon all existing ZeroSum and SymSum_Vec
distinguishers on both SHA-3 and Xoodyak. As regards Keccak-p, the internal
permutation of SHA-3, we report the best 15-round distinguisher with a complexity of and the first better than birthday-bound 16-round distinguisher with
a complexity of (improving upon the 15/16-round results by Guo et al. in
Asiacrypt 2016). We also devise the best full-round distinguisher on the Xoodoo
internal permutation of Xoodyak with a practically verifiable complexity of
and furnish the first third-party distinguishers on the Belarushian hash function
Bash. All distinguishers furnished in this work have been verified through implementations whenever practically viable. Overall, with the MAD barrier broken,
SymSum_Sim emerges as a better distinguisher than ZeroSum on all fronts and
adds to the state-of-the-art of cryptanalytic tools investigating non-randomness
of crypto primitives