Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP

  • Ling Song State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China; Nanyang Technological University
  • Jian Guo Nanyang Technological University
Keywords: Ketje, Xoodoo, Keccak-MAC, cube attack, auxiliary variable, MILP

Abstract

Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 2015. It recovers the key through two phases: the preprocessing phase for precomputing a look-up table and online phase for querying the output and getting the cube sum with which the right key can be retrieved by looking up the precomputed table. It was shown that such attacks are efficient specifically for Keccak-based constructions with small nonce or message block size. In this paper, we provide a mixed integer linear programming (MILP) model for cubeattack- like cryptanalysis on keyed Keccak, which does not impose any unnecessary constraint on cube variables and finds almost optimal cubes by balancing the two phases of cube-attack-like cryptanalysis. Our model is applied to Ketje Jr, Ketje Sr, a Xoodoo-based authenticated encryption and Keccak-MAC-512, all of which have a relatively small nonce or message block size. As a result, time complexities of 5-round attacks on Ketje Jr and 7-round attacks on Ketje Sr can be improved significantly. Meanwhile, 6-round attacks, one more round than the previous best attack, are possible if the key size of Ketje V1 (V2) is reduced to 72 (80) bits. For Xoodoo-based AE in Ketje style, the attack reaches 6 rounds. Additionally, a 7-round attack of Keccak-MAC-512 is achieved. To verify the correctness of our attacks, a 5-round attack on Ketje V1 is implemented and tested practically. It is noted that this work does not threaten the security of any Keccak-based construction.

Published
2018-09-04
How to Cite
Song, L., & Guo, J. (2018). Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP. IACR Transactions on Symmetric Cryptology, 2018(3), 182-214. https://doi.org/10.13154/tosc.v2018.i3.182-214
Section
Articles