Paper 2024/2055

Zeroed Out: Cryptanalysis of Weak PRFs in Alternating Moduli

Irati Manterola Ayala, Simula UiB
Håvard Raddum, Simula UiB
Abstract

The growing adoption of secure multi-party computation (MPC) has driven the development of efficient symmetric key primitives tailored for MPC. Recent advancements, such as the alternating moduli paradigm, have shown promise but leave room for cryptographic and practical improvements. In this paper, we analyze a family of weak pseudorandom functions (wPRF) proposed at Crypto 2024, focusing on the One-to-One parameter sets. We demonstrate that these configurations fail to achieve their intended one-to-one mappings and exploit this observation to develop an efficient key recovery attack. The attacks reveal significant vulnerabilities, reducing the complexity of key recovery to O(2^(λ/2) log_2 (λ)) for the Standard One-to-One wPRF and O(2^(0.84λ)) for the Reversed Moduli variant– both substantially below their claimed λ-bit security. We validate our findings through experimental evaluations, confirming alignment between predicted and observed attack complexities.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
MPCWeak pseudorandom functionsAlternating moduli paradigmSymmetric cryptanalysisKey recovery attack
Contact author(s)
irati @ simula no
haavardr @ simula no
History
2024-12-22: approved
2024-12-20: received
See all versions
Short URL
https://ia.cr/2024/2055
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/2055,
      author = {Irati Manterola Ayala and Håvard Raddum},
      title = {Zeroed Out: Cryptanalysis of Weak {PRFs} in Alternating Moduli},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/2055},
      year = {2024},
      url = {https://eprint.iacr.org/2024/2055}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.