Paper 2018/075
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes
Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, and Xiaoyun Wang
Abstract
Cube-attack-like cryptanalysis was proposed by Dinur et al. at EUROCRYPT 2015, which recovers the key of Keccak keyed modes in a divide-and-conquer manner. In their attack, one selects cube variables manually, which leads to more key bits involved in the key-recovery attack, so the complexity is too high unnecessarily.
In this paper, we introduce a new MILP model and make the cube attacks better on the Keccak keyed modes. Using this new MILP tool, we find the optimal cube variables for Keccak-MAC, Keyak and Ketje, which makes that a minimum number of key bits are involved in the key-recovery attack. For example, when the capacity is 256, we find a new 32-dimension cube for Keccak-MAC that involves only 18 key bits instead of Dinur et al.'s 64 bits and the complexity of the 6-round attack is reduced to
Metadata
- Available format(s)
-
PDF
- Publication info
- Published elsewhere. Designs, Codes and Cryptography
- DOI
- 10.1007/s10623-018-0526-x
- Keywords
- Keccak-MACKeyakKetjeMILPCube attack
- Contact author(s)
-
biwenquan @ mail sdu edu cn
xiaoyangdong @ tsinghua edu cn - History
- 2018-07-27: last of 3 revisions
- 2018-01-18: received
- See all versions
- Short URL
- https://ia.cr/2018/075
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/075, author = {Wenquan Bi and Xiaoyang Dong and Zheng Li and Rui Zong and Xiaoyun Wang}, title = {{MILP}-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/075}, year = {2018}, doi = {10.1007/s10623-018-0526-x}, url = {https://eprint.iacr.org/2018/075} }