Paper 2020/781

Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff

Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, and Willi Meier

Abstract

We introduce an interpolation attack using the \textsc{Moebius Transform}. This can reduce the time complexity to get a linear system of equations for specified intermediate state bits, which is general to cryptanalysis of some ciphers with update function of low algebraic degree. Along this line, we perform an interpolation attack against \textsc{Elephant-Delirium}, a round 2 submission of the ongoing NIST lightweight cryptography project. This is the first third-party cryptanalysis on this cipher. Moreover, we promote the interpolation attack by applying it to the \textbf{Farfalle} pseudo-random constructions \textsc{Kravatte} and \textsc{Xoofff}. Our attacks turn out to be the most efficient method for these ciphers thus far.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint. MINOR revision.
Keywords
Interpolation AttackMoebius TransformElephantKravatteXoofff
Contact author(s)
haibo chou @ qq com
xiaoyangdong @ tsinghua edu cn
willi meier @ fhnw ch
History
2020-07-02: revised
2020-06-27: received
See all versions
Short URL
https://ia.cr/2020/781
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/781,
      author = {Haibo Zhou and Rui Zong and Xiaoyang Dong and Keting Jia and Willi Meier},
      title = {Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff},
      howpublished = {Cryptology {ePrint} Archive, Paper 2020/781},
      year = {2020},
      url = {https://eprint.iacr.org/2020/781}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.