Paper 2025/954

Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails

Lorenzo Grassi, Eindhoven University of Technology, Eindhoven, the Netherlands, Ponos Technology, Zug, Switzerland
Katharina Koschatko, Graz University of Technology, Graz, Austria
Christian Rechberger, Graz University of Technology, Graz, Austria
Abstract

At the current state of the art, algebraic attacks are the most efficient method for finding preimages and collisions for arithmetization-oriented hash functions, such as the closely related primitives Poseidon/Poseidon2 and Neptune. In this paper, we revisit Gröbner basis (GB) attacks that exploit subspace trails to linearize some partial rounds, considering both sponge and compression modes. Starting from Poseidon's original security evaluation, we identified some inaccuracies in the model description that may lead to misestimated round requirements. Consequently, we reevaluate and improve the proposed attack strategy. We find that depending on the concrete instantiation, the original security analysis of Poseidon under- or overestimates the number of rounds needed for security. Moreover, we demonstrate that GB attacks leveraging subspace trails can outperform basic GB attacks for Poseidon/Poseidon2 and Neptune. We propose a variant of the previous attack strategy that exploits a crucial difference between Poseidon/Poseidon2 and Neptune: while Poseidon's inverse round functions have a high degree, Neptune's inverse external rounds maintain the same degree as the forward rounds. Using this new model, we demonstrate that Neptune's security in compression mode cannot be reduced to its security against the Constrained-Input-Constrained-Output (CICO) problem. To the best of our knowledge, this is the first time a concrete example has been provided where finding preimages is easier than solving the corresponding CICO problem. Our results emphasize the importance of considering the mode of operation in security analysis while confirming the overall security of Poseidon/Poseidon2 and Neptune against the presented algebraic attacks.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published by the IACR in TOSC 2025
Keywords
Poseidon/Poseidon2NeptuneGröbner BasisSubspace TrailMode of OperationSponge (CICO)Compression
Contact author(s)
l grassi @ tue nl
katharina koschatko @ tugraz at
christian rechberger @ tugraz at
History
2025-05-26: approved
2025-05-26: received
See all versions
Short URL
https://ia.cr/2025/954
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/954,
      author = {Lorenzo Grassi and Katharina Koschatko and Christian Rechberger},
      title = {Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/954},
      year = {2025},
      url = {https://eprint.iacr.org/2025/954}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.