TY - JOUR AU - Song, Ling AU - Guo, Jian PY - 2018/09/04 Y2 - 2024/03/28 TI - Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP JF - IACR Transactions on Symmetric Cryptology JA - ToSC VL - 2018 IS - 3 SE - Articles DO - 10.13154/tosc.v2018.i3.182-214 UR - https://tosc.iacr.org/index.php/ToSC/article/view/7301 SP - 182-214 AB - <p>Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur <em>et al.</em> at EUROCRYPT 2015. It recovers the key through two phases: the preprocessing phase for precomputing a look-up table and online phase for querying the output and getting the cube sum with which the right key can be retrieved by looking up the precomputed table. It was shown that such attacks are efficient specifically for Keccak-based constructions with small nonce or message block size. In this paper, we provide a mixed integer linear programming (MILP) model for cubeattack- like cryptanalysis on keyed Keccak, which does not impose any unnecessary constraint on cube variables and finds almost optimal cubes by balancing the two phases of cube-attack-like cryptanalysis. Our model is applied to Ketje Jr, Ketje Sr, a Xoodoo-based authenticated encryption and Keccak-MAC-512, all of which have a relatively small nonce or message block size. As a result, time complexities of 5-round attacks on Ketje Jr and 7-round attacks on Ketje Sr can be improved significantly. Meanwhile, 6-round attacks, one more round than the previous best attack, are possible if the key size of Ketje V1 (V2) is reduced to 72 (80) bits. For Xoodoo-based AE in Ketje style, the attack reaches 6 rounds. Additionally, a 7-round attack of Keccak-MAC-512 is achieved. To verify the correctness of our attacks, a 5-round attack on Ketje V1 is implemented and tested practically. It is noted that this work does not threaten the security of any Keccak-based construction.</p> ER -