Collision Attack on 5 Rounds of Grstl Martin Schl Florian Mendel - - PowerPoint PPT Presentation

collision attack on 5 rounds of gr stl
SMART_READER_LITE
LIVE PREVIEW

Collision Attack on 5 Rounds of Grstl Martin Schl Florian Mendel - - PowerPoint PPT Presentation

Collision Attack on 5 Rounds of Grstl Martin Schl Florian Mendel Vincent Rijmen affer The Grstl Hash Function The Grstl Hash Function m 1 m 2 m t f f f IV hash n 2 n 2 n 2 n SHA-3 finalist designed by Knudsen et al.


slide-1
SLIDE 1

Collision Attack on 5 Rounds of Grøstl

Florian Mendel Vincent Rijmen Martin Schl¨ affer

slide-2
SLIDE 2

The Grøstl Hash Function

slide-3
SLIDE 3

The Grøstl Hash Function

IV f

2n

m1 f

2n

m2 f mt

2n

Ω hash

n

SHA-3 finalist designed by Knudsen et al.

iterative, Merkle-Damg˚ ard design principle wide-pipe construction, 2n-bit chaining value

slide-4
SLIDE 4

The Grøstl Compression Function

hi−1 hi P Q mi

2n 2n 2n

Permutation based design

8 × 8 state and 10 rounds for Grøstl-256 8 × 16 state and 14 rounds for Grøstl-512

slide-5
SLIDE 5

The Grøstl-256 Round Transformations

Q: P:

0i 1i 2i 3i 4i 5i 6i 7i

AddConstant

fi ei di ci bi ai 9i 8i ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff S

SubBytes

S

ShiftBytes MixBytes

AES like round transformation ri = MB ◦ SH ◦ SB ◦ AC

slide-6
SLIDE 6

Existing Analysis of Grøstl

slide-7
SLIDE 7

Existing Analysis of Grøstl

Grøstl received a large amount of cryptanalysis

slide-8
SLIDE 8

Existing Analysis of Grøstl

Grøstl received a large amount of cryptanalysis Initiated by the design team itself → rebound attack

slide-9
SLIDE 9

Existing Analysis of Grøstl

Grøstl received a large amount of cryptanalysis Initiated by the design team itself → rebound attack Several improvements have been made

slide-10
SLIDE 10

Existing Analysis of Grøstl

Grøstl received a large amount of cryptanalysis Initiated by the design team itself → rebound attack Several improvements have been made

Internal differential attack

slide-11
SLIDE 11

Existing Analysis of Grøstl

Grøstl received a large amount of cryptanalysis Initiated by the design team itself → rebound attack Several improvements have been made

Internal differential attack Zero-sum distinguisher

slide-12
SLIDE 12

Existing Analysis of Grøstl

Grøstl received a large amount of cryptanalysis Initiated by the design team itself → rebound attack Several improvements have been made

Internal differential attack Zero-sum distinguisher Meet-in-the-middle attacks

slide-13
SLIDE 13

Existing Analysis of Grøstl

Grøstl received a large amount of cryptanalysis Initiated by the design team itself → rebound attack Several improvements have been made

Internal differential attack Zero-sum distinguisher Meet-in-the-middle attacks . . .

slide-14
SLIDE 14

Existing Analysis of Grøstl I

Elena Andreeva, Bart Mennink, and Bart Preneel. On the Indifferentiability of the Grøstl Hash Function. In Juan A. Garay and Roberto De Prisco, editors, SCN, volume 6280 of LNCS, pages 88–105. Springer, 2010. Elena Andreeva, Bart Mennink, Bart Preneel, and Marjan Skrobot. Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein. In Aikaterini Mitrokotsa and Serge Vaudenay, editors, AFRICACRYPT, volume 7374 of LNCS, pages 287–305. Springer, 2012. Paulo S. L. M. Barreto. An observation on Grøstl. NIST hash function mailing list, 2008. Christina Boura, Anne Canteaut, and Christophe De Canni` ere. Higher-Order Differential Properties of Keccak and Luffa. In Antoine Joux, editor, FSE, volume 6733 of LNCS, pages 252–269. Springer, 2011. Sareh Emami, Praveen Gauravaram, Josef Pieprzyk, and Ron Steinfeld. (Chosen-multi-target) preimage attacks on reduced Grøstl. http://web.science.mq.edu.au/~rons/preimageattack-final.pdf. Henri Gilbert and Thomas Peyrin. Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations. In Seokhie Hong and Tetsu Iwata, editors, FSE, volume 6147 of LNCS, pages 365–383. Springer, 2010.

slide-15
SLIDE 15

Existing Analysis of Grøstl II

Kota Ideguchi, Elmar Tischhauser, and Bart Preneel. Improved Collision Attacks on the Reduced-Round Grøstl Hash Function. In Mike Burmester, Gene Tsudik, Spyros S. Magliveras, and Ivana Ilic, editors, ISC, volume 6531 of LNCS, pages 1–16. Springer, 2010. J´ er´ emy Jean, Mar´ ıa Naya-Plasencia, and Thomas Peyrin. Improved Rebound Attack on the Finalist Grøstl. In Anne Canteaut, editor, FSE, volume 7549 of LNCS, pages 110–126. Springer, 2012. J´ er´ emy Jean, Mar´ ıa Naya-Plasencia, and Thomas Peyrin. Multiple Limited-Birthday Distinguishers and Applications. In Tanja Lange, Kristin Lauter, and Petr Lisonek, editors, Selected Areas in Cryptography,

  • LNCS. Springer, 2013.

John Kelsey. Some notes on Grøstl. NIST hash function mailing list, 2009. Florian Mendel, Thomas Peyrin, Christian Rechberger, and Martin Schl¨ affer. Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. In Michael J. Jacobson Jr., Vincent Rijmen, and Reihaneh Safavi-Naini, editors, Selected Areas in Cryptography, volume 5867 of LNCS, pages 16–35. Springer, 2009. Florian Mendel, Christian Rechberger, Martin Schl¨ affer, and Søren S. Thomsen. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. In Orr Dunkelman, editor, FSE, volume 5665 of LNCS, pages 260–276. Springer, 2009.

slide-16
SLIDE 16

Existing Analysis of Grøstl III

Florian Mendel, Christian Rechberger, Martin Schl¨ affer, and Søren S. Thomsen. Rebound Attacks on the Reduced Grøstl Hash Function. In Josef Pieprzyk, editor, CT-RSA, volume 5985 of LNCS, pages 350–365. Springer, 2010. Marine Minier and Ga¨ el Thomas. An Integral Distinguisher on Grøstl-512. In Goutam Paul and Serge Vaudenay, editors, INDOCRYPT, volume 8250 of LNCS, pages 50–59. Springer, 2013. Thomas Peyrin. Improved Differential Attacks for ECHO and Grøstl. In Tal Rabin, editor, CRYPTO, volume 6223 of LNCS, pages 370–392. Springer, 2010. Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta. Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. In Masayuki Abe, editor, ASIACRYPT, volume 6477 of LNCS, pages 38–55. Springer, 2010. Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, and Kazuo Ohta. An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl. In Josh Benaloh, editor, CT-RSA, volume 8366 of LNCS, pages 424–443. Springer, 2014. Martin Schl¨ affer. Updated Differential Analysis of Grøstl. http://groestl.info, 2011. Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, and Jian Zou. (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. In Anne Canteaut, editor, FSE, volume 7549 of LNCS, pages 127–145. Springer, 2012.

slide-17
SLIDE 17

Attacks on the Hash Function

Most of the analysis focus on the building blocks of Grøstl

slide-18
SLIDE 18

Attacks on the Hash Function

Most of the analysis focus on the building blocks of Grøstl Only a few results have been published for the hash function rounds complexity memory Grøstl-256 3 264

  • Grøstl-512

3 2192

slide-19
SLIDE 19

Attacks on the Hash Function

Most of the analysis focus on the building blocks of Grøstl Only a few results have been published for the hash function rounds complexity memory Grøstl-256 3 264

  • Grøstl-512

3 2192

  • ⇒ We will show collision attacks for up to 5 rounds of Grøstl
slide-20
SLIDE 20

Basic Attack Strategy

slide-21
SLIDE 21

Basic Attack Strategy

Combines ideas of the attack on SMASH with the rebound attack

slide-22
SLIDE 22

Basic Attack Strategy

Combines ideas of the attack on SMASH with the rebound attack Similar to the attack on Grindahl

slide-23
SLIDE 23

Basic Attack Strategy

Combines ideas of the attack on SMASH with the rebound attack Similar to the attack on Grindahl Attack uses a new type of truncated differential trail spanning

  • ver more than one message block
slide-24
SLIDE 24

Basic Attack Strategy

Combines ideas of the attack on SMASH with the rebound attack Similar to the attack on Grindahl Attack uses a new type of truncated differential trail spanning

  • ver more than one message block

Starting with an (almost) arbitrary difference in the chaining variable

slide-25
SLIDE 25

Basic Attack Strategy

Combines ideas of the attack on SMASH with the rebound attack Similar to the attack on Grindahl Attack uses a new type of truncated differential trail spanning

  • ver more than one message block

Starting with an (almost) arbitrary difference in the chaining variable Iteratively canceling the differences in the chaining variable

slide-26
SLIDE 26

Basic Attack Strategy

Combines ideas of the attack on SMASH with the rebound attack Similar to the attack on Grindahl Attack uses a new type of truncated differential trail spanning

  • ver more than one message block

Starting with an (almost) arbitrary difference in the chaining variable Iteratively canceling the differences in the chaining variable Having only differences in one of the two permutations

slide-27
SLIDE 27

Equivalent Description of Grøstl

To simplify the description of the attack we use an equivalent description of Grøstl h′ = MB−1(IV) h′

i

= P′(MB(h′

i−1) ⊕ mi) ⊕ Q′(mi) ⊕ h′ i−1

for 1 ≤ i ≤ t hash = Ω(MB(h′

t))

with hi = MB(h′

i)

The last MixBytes transformation of the permutations P and Q are swapped with the XOR operation of the feed-forward

slide-28
SLIDE 28

Attack on 4 Rounds of Grøstl-256

The core of the attack on 4 rounds are truncated differential trails for P′ with only 8 active bytes at the output of round r4 64

r1

− → 64

r2

− → 8

r3

− → 8

r4

− → 8 Using the rebound attack all the 264 solutions for this truncated differential trail with a given/fixed difference difference at the input of P′ can be found with complexity 264 in time and memory

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH

P′ P′

1

P′

2

P′

3

P′

4

slide-29
SLIDE 29

Attack on 4 Rounds of Grøstl-256

Choose some arbitrary m1, m∗

1 to get a full active state in h′ 1

Construct 264 solutions for the truncated differential trail in P′ to find a m2 such that 8 bytes of the difference in h′

2 are canceled

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH MB

m2 h′

1

h′

2

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH

slide-30
SLIDE 30

Attack on 4 Rounds of Grøstl-256

Construct 264 solutions for a rotated variant of the truncated differential trail to cancel another 8 bytes of the difference in h′

3

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH MB

m3 h′

2

h′

3

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH

slide-31
SLIDE 31

Attack on 4 Rounds of Grøstl-256

Repeat this in total 8 times until a collision has been found in h′

9

h′

3

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH MB

m4 h′

3

h′

4

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH

slide-32
SLIDE 32

Attack on 4 Rounds of Grøstl-256

Repeat this in total 8 times until a collision has been found in h′

9

h′

3

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH MB

m5 h′

4

h′

5

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH

slide-33
SLIDE 33

Attack on 4 Rounds of Grøstl-256

Repeat this in total 8 times until a collision has been found in h′

9

h′

3

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH MB

m6 h′

5

h′

6

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH

slide-34
SLIDE 34

Attack on 4 Rounds of Grøstl-256

Repeat this in total 8 times until a collision has been found in h′

9

h′

3

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH MB

m7 h′

6

h′

7

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH

slide-35
SLIDE 35

Attack on 4 Rounds of Grøstl-256

Repeat this in total 8 times until a collision has been found in h′

9

h′

3

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH MB

m8 h′

7

h′

8

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH

slide-36
SLIDE 36

Attack on 4 Rounds of Grøstl-256

Repeat this in total 8 times until a collision has been found in h′

9

h′

3

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH MB

m9 h′

8

h′

9

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH

slide-37
SLIDE 37

Attack on 4 Rounds of Grøstl-256

Repeat this in total 8 times until a collision has been found in h′

9

h′

3

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH MB

m9 h′

8

h′

9

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH

⇒ Collision attack for 4 rounds with complexity of 8 · 264 = 267

slide-38
SLIDE 38

Extending the Attack to 5 Rounds

slide-39
SLIDE 39

Attack on 5 Rounds of Grøstl-256

For the attack on 5 rounds we use truncated differential trails with

  • nly one active byte at the output of round r3

64

r1

− → 64

r2

− → 8

r3

− → 1

r4

− → 8

r5

− → 8

slide-40
SLIDE 40

Attack on 5 Rounds of Grøstl-256

For the attack on 5 rounds we use truncated differential trails with

  • nly one active byte at the output of round r3

64

r1

− → 64

r2

− → 8

r3

− → 1

r4

− → 8

r5

− → 8 Using the rebound attack all the 28 solutions for this truncated differential with a given/fixed difference at the input of P′ can be found with complexity 264 in time and memory

AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH MB AC SB SH

P′ P′

1

P′

2

P′

3

P′

4

P′

5

slide-41
SLIDE 41

Attack on 5 Rounds of Grøstl-256

Each step of the attack will succeed only with probability 2−56

slide-42
SLIDE 42

Attack on 5 Rounds of Grøstl-256

Each step of the attack will succeed only with probability 2−56 We can compensate this by using more message blocks and repeating each step of the attack 256 times

slide-43
SLIDE 43

Attack on 5 Rounds of Grøstl-256

Each step of the attack will succeed only with probability 2−56 We can compensate this by using more message blocks and repeating each step of the attack 256 times Any of the 28 solutions can be used to generate a new starting point for the next iteration, while keeping the same bytes inactive in chaining variable

slide-44
SLIDE 44

Attack on 5 Rounds of Grøstl-256

Each step of the attack will succeed only with probability 2−56 We can compensate this by using more message blocks and repeating each step of the attack 256 times Any of the 28 solutions can be used to generate a new starting point for the next iteration, while keeping the same bytes inactive in chaining variable ⇒ Collision attack for 5 rounds with complexity of 8 · 264+56 = 2123

slide-45
SLIDE 45

Summary

rounds complexity memory Grøstl-256 3 264

  • 4

267 264 5 2123 264

slide-46
SLIDE 46

Summary

rounds complexity memory Grøstl-256 3 264

  • 4

267 264 5 2120 264

slide-47
SLIDE 47

Application to Grøstl-512

slide-48
SLIDE 48

Application to Grøstl-512

The attacks can be trivially extended to Grøstl-512

slide-49
SLIDE 49

Application to Grøstl-512

The attacks can be trivially extended to Grøstl-512 We can use the following sequence of active bytes 128

r1

− → 128

r2

− → 16

r3

− → 16

r4

− → 16 for the collision attack on 4 rounds

slide-50
SLIDE 50

Application to Grøstl-512

The attacks can be trivially extended to Grøstl-512 We can use the following sequence of active bytes 128

r1

− → 128

r2

− → 16

r3

− → 16

r4

− → 16 for the collision attack on 4 rounds, and 128

r1

− → 64

r2

− → 8

r3

− → 2

r4

− → 16

r5

− → 16 for the collision attack on 5 rounds

slide-51
SLIDE 51

Application to Grøstl-512

The attacks can be trivially extended to Grøstl-512 We can use the following sequence of active bytes 128

r1

− → 128

r2

− → 16

r3

− → 16

r4

− → 16 for the collision attack on 4 rounds, and 128

r1

− → 64

r2

− → 8

r3

− → 2

r4

− → 16

r5

− → 16 for the collision attack on 5 rounds ⇒ Collision attack on 4 and 5 rounds of Grøstl-512 with a complexity of 2131 and 2176

slide-52
SLIDE 52

Summary

rounds complexity memory Grøstl-256 3 264

  • 4

267 264 5 2120 264 Grøstl-512 3 2192

  • 4

2131 264 5 2176 264

slide-53
SLIDE 53

Thank you for your attention!