Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives

被引:0
作者
Chen, Shiyao [1 ,2 ,3 ]
Guo, Chun [3 ,4 ,6 ]
Guo, Jian [2 ]
Liu, Li [3 ,4 ]
Wang, Meiqin [3 ,4 ,5 ]
Wei, Puwen [3 ,4 ,5 ]
Xu, Zeyu [3 ,4 ]
机构
[1] Nanyang Technol Univ, Strateg Ctr Res Privacy Preserving Technol & Syst, Singapore, Singapore
[2] Nanyang Technol Univ, Div Math Sci, Sch Phys & Math Sci, Singapore, Singapore
[3] Shandong Univ, Sch Cyber Sci & Technol, Qingdao, Peoples R China
[4] Shandong Univ, Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan 250100, Peoples R China
[5] Quan Cheng Lab, Jinan, Peoples R China
[6] Shandong Res Inst Ind Technol, Jinan, Peoples R China
基金
国家重点研发计划; 新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Symmetric-Key; Cryptanalysis; Proof; MPC/FHE/ZK-Friendly Primitives; Generalized Feistel; GMiMC; CIPHERS;
D O I
10.46586/tosc.v2023.i2.132-175
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Symmetric-key primitives designed over the prime field F-p with odd characteristics, rather than the traditional F-2(n) , are becoming the most popular choice for MPC/FHE/ZK-protocols for better efficiencies. However, the security of F-p is less understood as there are highly nontrivial gaps when extending the cryptanalysis tools and experiences built on F-2(n) in the past few decades to F-p. At CRYPTO 2015, Sun et al. established the links among impossible differential, zero-correlation linear, and integral cryptanalysis over F-2(n) from the perspective of distinguishers. In this paper, following the definition of linear correlations over Fp by Baign & egrave;res, Stern and Vaudenay at SAC 2007, we successfully establish comprehensive links over F-p, by reproducing the proofs and offering alternatives when necessary. Interesting and important differences between F-p and F-2(n) are observed.- Zero-correlation linear hulls can not lead to integral distinguishers for some cases over F-p, while this is always possible over F(2 )(n)proven by Sun et al..- When the newly established links are applied to GMiMC, its impossible differential, zero-correlation linear hull and integral distinguishers can be increased by up to 3 rounds for most of the cases, and even to an arbitrary number of rounds for some special and limited cases, which only appeared in F-p. It should be noted that all these distinguishers do not invalidate GMiMC's security claims.The development of the theories over F-p behind these links, and properties identified (be it similar or different) will bring clearer and easier understanding of security of primitives in this emerging F-p field, which we believe will provide useful guides for future cryptanalysis and design.
引用
收藏
页码:132 / 175
页数:44
相关论文
共 54 条
[1]   MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [J].
Albrecht, Martin ;
Grassi, Lorenzo ;
Rechberger, Christian ;
Roy, Arnab ;
Tiessen, Tyge .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :191-219
[2]   Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC [J].
Albrecht, Martin R. ;
Cid, Carlos ;
Grassi, Lorenzo ;
Khovratovich, Dmitry ;
Lueftenegger, Reinhard ;
Rechberger, Christian ;
Schofnegger, Markus .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 :371-397
[3]   Feistel Structures for MPC, and More [J].
Albrecht, Martin R. ;
Grassi, Lorenzo ;
Perrin, Leo ;
Ramacher, Sebastian ;
Rechberger, Christian ;
Rotaru, Dragos ;
Roy, Arnab ;
Schofnegger, Markus .
COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 :151-171
[4]   Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols [J].
Aly, Abdelrahaman ;
Ashur, Tomer ;
Ben-Sasson, Eli ;
Dhooghe, Siemen ;
Szepieniec, Alan .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) :1-45
[5]   Chaghri - A FHE-friendly Block Cipher [J].
Ashur, Tomer ;
Mahzoun, Mohammad ;
Toprakhisar, Dilara .
PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, :139-150
[6]  
Bertoni G, 2008, LECT NOTES COMPUT SC, V4965, P181
[7]  
Bertoni G, 2017, IACR T SYMMETRIC CRY, V2017, P1, DOI 10.13154/tosc.v2017.i4.1-38
[8]  
Bertoni G, 2013, LECT NOTES COMPUT SC, V7881, P313, DOI 10.1007/978-3-642-38348-9_19
[9]   Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems [J].
Beyne, Tim ;
Canteaut, Anne ;
Dinur, Hal ;
Eichlseder, Maria ;
Leander, Gregor ;
Leurent, Gaetan ;
Naya-Plasencia, Maria ;
Perrin, Leo ;
Sasaki, Yu ;
Todo, Yosuke ;
Wiemer, Friedrich .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT III, 2020, 12172 :299-328
[10]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2