TY - JOUR
AU - Grassi, Lorenzo
AU - Khovratovich, Dmitry
AU - RÃ¸njom, Sondre
AU - Schofnegger, Markus
PY - 2022/03/11
Y2 - 2022/05/23
TI - The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp: Preimage Attack on Full Grendel
JF - IACR Transactions on Symmetric Cryptology
JA - ToSC
VL - 2022
IS - 1
SE - Articles
DO - 10.46586/tosc.v2022.i1.5-37
UR - https://tosc.iacr.org/index.php/ToSC/article/view/9525
SP - 5-37
AB - <p>Motivated by modern cryptographic use cases such as multi-party computation (MPC), homomorphic encryption (HE), and zero-knowledge (ZK) protocols, several symmetric schemes that are efficient in these scenarios have recently been proposed in the literature. Some of these schemes are instantiated with low-degree nonlinear functions, for example low-degree power maps (e.g., MiMC, HadesMiMC, Poseidon) or the Toffoli gate (e.g., Ciminion). Others (e.g., <em>Rescue</em>, <em>Vision</em>, <em>Grendel</em>) are instead instantiated via high-degree functions which are easy to evaluate in the target application. A recent example for the latter case is the hash function <em>Grendel</em>, whose nonlinear layer is constructed using the Legendre symbol. In this paper, we analyze high-degree functions such as the Legendre symbol or the modulo-2 operation as building blocks for the nonlinear layer of a cryptographic scheme over F<sup><em>n</em></sup><em><sub>p</sub></em>.Our focus regards the security analysis rather than the efficiency in the mentioned use cases. For this purpose, we present several new invertible functions that make use of the Legendre symbol or of the modulo-2 operation.<br>Even though these functions often provide strong statistical properties and ensure a high degree after a few rounds, the main problem regards their small number of possible outputs, that is, only three for the Legendre symbol and only two for the modulo-2 operation. By fixing them, it is possible to reduce the overall degree of the function significantly. We exploit this behavior by describing the first preimage attack on full <em>Grendel</em>, and we verify it in practice.</p>
ER -