2022
DOI: 10.46586/tosc.v2022.i3.73-101
|View full text |Cite
|
Sign up to set email alerts
|

Algebraic Attacks against Some Arithmetization-Oriented Primitives

Abstract: Recent advanced Zero-Knowledge protocols, along with other high-level constructions such as Multi-Party Computations (MPC), have highlighted the need for a new type of symmetric primitives that are not optimized for speed on the usual platforms (desktop computers, servers, microcontrollers, RFID tags...), but for their ability to be implemented using arithmetic circuits.Several primitives have already been proposed to satisfy this need. In order to enable an efficient arithmetization, they operate over large f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…It is often used as a proxy to estimate the security provided by a public permutation as, for instance, the complexity of a key recovery does not apply in this context. It is actually the problem that had to be solved for the ZK Hash Function Cryptanalysis Bounties 2021 organized by Ethereum [Eth21], which was tackled in [BBLP22]. The CICO problem is defined as follows.…”
Section: The Weak Hash Function Stirmentioning
confidence: 99%
See 1 more Smart Citation
“…It is often used as a proxy to estimate the security provided by a public permutation as, for instance, the complexity of a key recovery does not apply in this context. It is actually the problem that had to be solved for the ZK Hash Function Cryptanalysis Bounties 2021 organized by Ethereum [Eth21], which was tackled in [BBLP22]. The CICO problem is defined as follows.…”
Section: The Weak Hash Function Stirmentioning
confidence: 99%
“…Indeed, it is tied to the specific model used to encode the evaluation of the primitive as an equation, or as a system of multi-variate equations, and this model is not unique. It has been shown for instance in [ACG + 19] and [BBLP22], that some of these primitives were much more vulnerable to such attacks than anticipated because of a clever re-writing of the involved equations.…”
Section: Introductionmentioning
confidence: 99%
“…In this section, we introduce a trick proposed by [35] which can help us skip two rounds without additional consumption when analyzing the permutation based on the SPN structure using the CICO problem.…”
Section: Techniques To Skip Spn Roundsmentioning
confidence: 99%
“…We introduce the Constrained Input/Constrained Output (CICO) problem [4] and exploit its solution to obtain preimages of the hash function of Grendel. In this way, we extend the previously proposed technique in [35] and improve the preimage attack by bypassing two additional rounds of the SPN structure. By introducing the CICO problem, our attack is capable of attacking two additional rounds compared to the attack presented in [22], as shown in Table 1.…”
mentioning
confidence: 99%
“…With respect to Poseidon, we emphasize that the input of Neptune π is multiplied by M (E) before the first S-Box layer is applied. This could make a difference in the case of algebraic attacks, since the invertible S-Box layer is defined via the concatenation of independent non-linear functions, as concretely shown in [BBLP22]. Indeed, if no initial diffusion/matrix multiplication takes place, one can potentially ignore the first S-Box layer (by replacing the initial value IV with the corresponding output via the S-Box layer).…”
Section: Initial Matrix Multiplicationmentioning
confidence: 99%