Paper 2024/2055
Zeroed Out: Cryptanalysis of Weak PRFs in Alternating Moduli
Abstract
The growing adoption of secure multi-party computation (MPC) has driven the development of efficient symmetric key primitives tailored for MPC. Recent advances, such as the alternating moduli paradigm, have shown promise but leave room for cryptographic and practical improvements. In this paper, we analyze a family of weak pseudorandom functions (wPRF) proposed at Crypto 2024, focusing on their One-to-One parameter sets. We demonstrate that these configurations fail to achieve their intended one-to-one mappings and exploit this observation to develop an efficient key recovery attack.
Our analysis reveals critical vulnerabilities, reducing the complexity of key recovery to
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- A minor revision of an IACR publication in TOSC 2025
- Keywords
- MPCWeak pseudorandom functionsAlternating moduli paradigmSymmetric cryptanalysisKey recovery attack
- Contact author(s)
-
irati @ simula no
haavardr @ simula no - History
- 2025-05-15: last of 2 revisions
- 2024-12-20: received
- See all versions
- Short URL
- https://ia.cr/2024/2055
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/2055, author = {Irati Manterola Ayala and Håvard Raddum}, title = {Zeroed Out: Cryptanalysis of Weak {PRFs} in Alternating Moduli}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/2055}, year = {2024}, url = {https://eprint.iacr.org/2024/2055} }