Paper 2015/279

Improved Cryptanalysis of AES-like Permutations

Jérémy Jean, Maria Naya-Plasencia, and Thomas Peyrin

Abstract

AES-based functions have attracted of a lot of analysis in the recent years, mainly due to the SHA-3 hash function competition. In particular, the rebound attack allowed to break several proposals and many improvements/variants of this method have been published. Yet, it remained an open question whether it was possible to reach one more round with this type of technique compared to the state-of-the-art. In this article, we close this open problem by providing a further improvement over the original rebound attack and its variants, that allows the attacker to control one more round in the middle of a differential path for an AES-like permutation. Our algorithm is based on lists merging as defined by Naya-Plasencia at CRYPTO 2011, and we generalized the concept to non-full active truncated differential paths proposed by Sasaki et al. at ASIACRYPT 2010. As an illustration, we applied our method to the internal permutations used in Grostl, one of the five finalist hash functions of the SHA-3 competition. When entering this final phase, the designers tweaked the function so as to thwart attacks proposed by Peyrin at CRYPTO 2010 that exploited relations between the internal permutations. Until our results, no analysis was published on Grostl and the best results reached 8 and 7 rounds for the 256-bit and 512-bit version respectively. By applying our algorithm, we present new internal permutation distinguishers on 9 and 10 rounds respectively.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published by the IACR in JOC 2014
Keywords
CryptanalysisHash FunctionAESSHA-3GrostlRebound Attack
Contact author(s)
Jeremy Jean @ ens fr
History
2015-03-25: received
Short URL
https://ia.cr/2015/279
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/279,
      author = {Jérémy Jean and Maria Naya-Plasencia and Thomas Peyrin},
      title = {Improved Cryptanalysis of {AES}-like Permutations},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/279},
      year = {2015},
      url = {https://eprint.iacr.org/2015/279}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.