TY - JOUR
T1 - New zero-sum distinguishers on full 24-round KECCAK-f using the division property
AU - Yan, Hailun
AU - Lai, Xuejia
AU - Wang, Lei
AU - Yu, Yu
AU - Xing, Yiran
N1 - Publisher Copyright:
© The Institution of Engineering and Technology 2019
PY - 2019/9/1
Y1 - 2019/9/1
N2 - The authors analyse the security of KECCAK (the winner in SHA-3 competition) by focusing on the zero-sum distinguishers of its underlying permutation (named KECCAK-f). The authors’ analyses are developed by using the division property, a generalised integral property that was initially used in the integral cryptanalysis of symmetric-key algorithms. Following the work pioneered by Todo at CRYPTO 2015, they first formalise and prove a more delicate propagation rule of the division property under the assumption that the S-box's specification is known to attackers. Then, they apply this rule to the inverse S-box in KECCAK-f with a further study on properties of its algebraic degree. They find that the rate of decline in the division property is gentler than that of a randomly chosen S-box. Meanwhile, they get the same results for the S-box in ASCON permutation. Thanks to this vulnerable property, they can improve the higher-order differential characteristics against the inverse of KECCAK-f in terms of the required number of chosen plaintexts. As an application, they give new zero-sum distinguishers on full 24-round KECCAK-f of size 21573. To the authors’ knowledge, this is currently the best zero-sum distinguishers of full-round KECCAK-f permutation. Incidentally, they give the corresponding results for 12-round ASCON permutation.
AB - The authors analyse the security of KECCAK (the winner in SHA-3 competition) by focusing on the zero-sum distinguishers of its underlying permutation (named KECCAK-f). The authors’ analyses are developed by using the division property, a generalised integral property that was initially used in the integral cryptanalysis of symmetric-key algorithms. Following the work pioneered by Todo at CRYPTO 2015, they first formalise and prove a more delicate propagation rule of the division property under the assumption that the S-box's specification is known to attackers. Then, they apply this rule to the inverse S-box in KECCAK-f with a further study on properties of its algebraic degree. They find that the rate of decline in the division property is gentler than that of a randomly chosen S-box. Meanwhile, they get the same results for the S-box in ASCON permutation. Thanks to this vulnerable property, they can improve the higher-order differential characteristics against the inverse of KECCAK-f in terms of the required number of chosen plaintexts. As an application, they give new zero-sum distinguishers on full 24-round KECCAK-f of size 21573. To the authors’ knowledge, this is currently the best zero-sum distinguishers of full-round KECCAK-f permutation. Incidentally, they give the corresponding results for 12-round ASCON permutation.
UR - https://www.scopus.com/pages/publications/85070465827
U2 - 10.1049/iet-ifs.2018.5263
DO - 10.1049/iet-ifs.2018.5263
M3 - 文章
AN - SCOPUS:85070465827
SN - 1751-8709
VL - 13
SP - 469
EP - 478
JO - IET Information Security
JF - IET Information Security
IS - 5
ER -