Paper 2024/052
Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash
Abstract
Higher order differential properties constitute a very insightful tool at the hands
of a cryptanalyst allowing for probing a cryptographic primitive from an algebraic perspective. In FSE 2017, Saha et al. reported SymSum (referred to as
SymSum_Vec in this paper), a new distinguisher based on higher order vectorial
Boolean derivatives of SHA-3, constituting one of the best distinguishers on the
latest cryptographic hash standard. SymSum_Vec exploits the difference in the
algebraic degree of highest degree monomials in the algebraic normal form of
SHA-3 with regards to their dependence on round constants. Later in Africacrypt
2020, Suryawanshi et al. extended SymSum_Vec using linearization techniques and
in SSS 2023 also applied it to NIST-LWC finalist Xoodyak. However, a major
limitation of SymSum_Vec is the maximum attainable derivative (MAD) which is
less than half of the widely studied ZeroSum distinguisher. This is attributed
to SymSum_Vec being dependent on m−fold vectorial derivatives while ZeroSum
relies on m−fold simple derivatives. In this work we overcome this limitation
of SymSum_Vec by developing and validating the theory of computing SymSum_Vec
with simple derivatives. This gives us a close to 100% improvement in the MAD
that can be computed. The new distinguisher reported in this work can also be combined with one/two-round linearization to penetrate more rounds. Moreover, we identify an issue with the two-round linearization claim made by Suryawanshi et al. which renders it invalid and also furnish an algebraic fix at the cost of some additional constraints.
Combining all results we report SymSum_Sim , a new variant of the SymSum_Vec
distinguisher based on m−fold simple derivatives that outperforms ZeroSum by
a factor of
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Boolean DerivativeSymSum DistinguisherHash FunctionSHA-3XoodyakBash
- Contact author(s)
-
sahibas @ iitbhilai ac in
sghosh03 @ campus haifa ac il
dhiman @ iitbhilai ac in
rprathamesh @ iitbhilai ac in - History
- 2024-01-15: approved
- 2024-01-13: received
- See all versions
- Short URL
- https://ia.cr/2024/052
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/052, author = {SAHIBA SURYAWANSHI and Shibam Ghosh and Dhiman Saha and Prathamesh Ram}, title = {Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the {ZeroSum} Distinguisher Applications to {SHA3}, Xoodyak and Bash}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/052}, year = {2024}, url = {https://eprint.iacr.org/2024/052} }