Paper 2021/1232

Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf

Gizem Kara and Oğuz Yayla

Abstract

A number of arithmetization-oriented ciphers emerge for use in advanced cryptographic protocols such as secure multi-party computation (MPC), fully homomorphic encryption (FHE) and zero-knowledge proofs (ZK) in recent years. The standard block ciphers like AES and the hash functions SHA2/SHA3 are proved to be efficient in software and hardware but not optimal to use in this field, for this reason, new kind of cryptographic primitives were proposed recently. However, unlike traditional ones, there is no standard approach to design and analyze such block ciphers and the hash functions, therefore their security analysis needs to be done carefully. In 2018, StarkWare launched a public STARK-Friendly Hash (SFH) Challenge to select an efficient and secure hash function to be used within ZK-STARKs, transparent and post-quantum secure proof systems. The block cipher JARVIS is one of the first ciphers designed for STARK applications but, shortly after its publication, the cipher has been shown vulnerable to Gröbner basis attack. This paper aims to describe a Gröbner basis attack on new block ciphers, MiMC, GMiMCerf (SFH candidates) and the variants of JARVIS. We present the complexity of Gröbner basis attack on JARVIS-like ciphers. Then we give results from our experiments for the attack on reduced-round MiMC and a structure we found in the Gröbner basis attack for GMiMCerf.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Gröbner BasisJarvisMiMCGMiMCSecure Multiparty ComputationZK-STARKs
Contact author(s)
oguz @ metu edu tr
History
2021-09-20: received
Short URL
https://ia.cr/2021/1232
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1232,
      author = {Gizem Kara and Oğuz Yayla},
      title = {Gröbner Basis Attack on {STARK}-Friendly Symmetric-Key Primitives: {JARVIS}, {MiMC} and {GMiMCerf}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/1232},
      year = {2021},
      url = {https://eprint.iacr.org/2021/1232}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.