Cryptanalysis of SFLASH with Slightly Modified Parameters Vivien - - PowerPoint PPT Presentation

cryptanalysis of sflash with slightly modified parameters
SMART_READER_LITE
LIVE PREVIEW

Cryptanalysis of SFLASH with Slightly Modified Parameters Vivien - - PowerPoint PPT Presentation

Introduction Description Strategy Attack Cryptanalysis of SFLASH with Slightly Modified Parameters Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Ecole normale suprieure, Paris Vivien Dubois, Pierre-Alain Fouque and Jacques Stern


slide-1
SLIDE 1

Introduction Description Strategy Attack

Cryptanalysis of SFLASH with Slightly Modified Parameters

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern

Ecole normale supérieure, Paris

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-2
SLIDE 2

Introduction Description Strategy Attack Multivariate Schemes

SFLASH is a multivariate signature scheme designed by Patarin-Goubin-Courtois in 2001

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-3
SLIDE 3

Introduction Description Strategy Attack Multivariate Schemes

SFLASH is a multivariate signature scheme designed by Patarin-Goubin-Courtois in 2001 It is reputed for being very fast

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-4
SLIDE 4

Introduction Description Strategy Attack Multivariate Schemes

SFLASH is a multivariate signature scheme designed by Patarin-Goubin-Courtois in 2001 It is reputed for being very fast It is reputed for being very light, suitable for low-end smartcards

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-5
SLIDE 5

Introduction Description Strategy Attack Multivariate Schemes

SFLASH is a multivariate signature scheme designed by Patarin-Goubin-Courtois in 2001 It is reputed for being very fast It is reputed for being very light, suitable for low-end smartcards It is recommended by the NESSIE European Consortium since 2003

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-6
SLIDE 6

Introduction Description Strategy Attack Multivariate Schemes

Topic of the talk

We show that slight modifications of the parameters render the scheme insecure

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-7
SLIDE 7

Introduction Description Strategy Attack Multivariate Schemes

Topic of the talk

We show that slight modifications of the parameters render the scheme insecure

More precisely...

SFLASH is some instance of C ∗− schemes [PGC98] All C ∗− schemes are currently considered secure

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-8
SLIDE 8

Introduction Description Strategy Attack Multivariate Schemes

Topic of the talk

We show that slight modifications of the parameters render the scheme insecure

More precisely...

SFLASH is some instance of C ∗− schemes [PGC98] All C ∗− schemes are currently considered secure We show that a large class of C ∗− schemes is insecure This class is defined by the non-coprimality of two parameters The attack does not apply to the parameters of SFLASH, but the choice of SFLASH parameters was not justified

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-9
SLIDE 9

Introduction Description Strategy Attack Multivariate Schemes

Organisation of the talk

A few basics about multivariate schemes Description of C ∗− schemes Basic strategy for attacking C ∗− schemes Description of the attack

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-10
SLIDE 10

Introduction Description Strategy Attack Multivariate Schemes

Multivariate Schemes

A family of asymmetric schemes Hard problems involve MQ polynomials over a finite field Fq e.g. solving an MQ system is NP-hard and currently requires exponential time and memory on average

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-11
SLIDE 11

Introduction Description Strategy Attack Multivariate Schemes

Multivariate Schemes

A family of asymmetric schemes Hard problems involve MQ polynomials over a finite field Fq e.g. solving an MQ system is NP-hard and currently requires exponential time and memory on average

The Generic Multivariate Construction

Hiding an easily invertible function using linear transforms P = T ◦ P ◦ S Schemes differ from the type of easy function embedded

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-12
SLIDE 12

Introduction Description Strategy Attack Multivariate Schemes

The C ∗ Scheme

C ∗ was proposed by [MI88] and broken by Patarin in 95

Short Description of C ∗

The internal function is a monomial over Fqn P(x) = x1+qθ = x.xqθ Fqn is a n-dimension vector space over Fq, isomorphic to (Fq)n Since a q-powering is linear in Fqn, P(x) is quadratic P(x) is an n-tuple of mult. quad. polynomials (p1, . . . , pn) pk(x1, . . . , xn) = α12x1x2 + α13x1x3 + . . . P can be inverted by raising to the inverse power of 1 + qθ P = T ◦ P ◦ S is the public key

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-13
SLIDE 13

Introduction Description Strategy Attack Multivariate Schemes

The attack by Patarin on C ∗

Any element x and y = P(x) satisfy yqθ−1 = x(qθ+1)(qθ−1) = ⇒ x.yqθ − y.xq2θ = 0 Consequence : plain and cipher texts are bilinearly related These bilinear equations can be determined using pairs (x, y) Then, for any specified value y, x is solution of a system of linear equations

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-14
SLIDE 14

Introduction Description Strategy Attack Parameters Instantiations

C ∗− Schemes

C ∗− schemes are C ∗ schemes with a truncated public key [PGC98]

Construction of a C ∗− scheme

(n, θ, r) are the parameters of the scheme

1 Generate a C ∗ with parameters (n, θ) : P(x) = x1+qθ 2 Remove the last r polynomials from the public key

T ◦ P ◦ S =            p1(x1, . . . , xn) . . . . . . pn(x1, . . . , xn)

Π

− →      p1(x1, . . . , xn) . . . pn−r(x1, .., xn) = Π ◦ P

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-15
SLIDE 15

Introduction Description Strategy Attack Parameters Instantiations

Signing with a C ∗− scheme

1 Append r random bits µ to the message m to be signed 2 Find a preimage σ of (m, µ) by T ◦ P ◦ S using S, T 3 Such a preimage always exists since a C ∗ monomial is bijective 4 σ is a valid signature since Π ◦ P(σ) = m Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-16
SLIDE 16

Introduction Description Strategy Attack Parameters Instantiations

Choosing Parameters

Parameters (n, θ) must define a bijective C ∗

P(x) = x1+qθ P is bijective when gcd(qθ + 1, qn − 1) = 1 (q even) This condition is equivalent to n/d odd where d = gcd(n, θ)

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-17
SLIDE 17

Introduction Description Strategy Attack Parameters Instantiations

Choosing Parameters

Parameters (n, θ) must define a bijective C ∗

P(x) = x1+qθ P is bijective when gcd(qθ + 1, qn − 1) = 1 (q even) This condition is equivalent to n/d odd where d = gcd(n, θ)

qr ≥ 280 to avoid a possible recomposing attack from [PGC98]

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-18
SLIDE 18

Introduction Description Strategy Attack Parameters Instantiations

Proposed Instantiations

The first version of SFLASH was a tweaked C ∗− scheme

S, T taken over F2 rather than Fq to make the key smaller This specificity could be exploited for an attack [GM02]

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-19
SLIDE 19

Introduction Description Strategy Attack Parameters Instantiations

Proposed Instantiations

The first version of SFLASH was a tweaked C ∗− scheme

S, T taken over F2 rather than Fq to make the key smaller This specificity could be exploited for an attack [GM02]

Standard Instantiations

q n θ d r Length PubKey Size FLASH 28 29 11 1 11 296 bits 18 Ko SFLASHv2 [NESSIE] 27 37 11 1 11 259 bits 15 Ko SFLASHv3 27 67 33 1 11 469 bits 112 Ko

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-20
SLIDE 20

Introduction Description Strategy Attack

Basic Strategy of our Attack

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-21
SLIDE 21

Introduction Description Strategy Attack

Basic Strategy of our Attack

Important observation

Consider a C ∗ public key P = T ◦ P ◦ S       p1 . . . . . . pn       =       t11 . . . t1n . . . . . . . . . . . . tn1 . . . tnn             (P ◦ S)1 . . . . . . (P ◦ S)n      

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-22
SLIDE 22

Introduction Description Strategy Attack

Basic Strategy of our Attack

Important observation

Consider a C ∗ public key P = T ◦ P ◦ S       p1 . . . . . . pn       =       t11 . . . t1n . . . . . . . . . . . . tn1 . . . tnn             (P ◦ S)1 . . . . . . (P ◦ S)n       The C ∗− public key Π ◦ P consists of the n − r first rows    p1 . . . pn−r    =    t11 . . . t1n . . . . . . tn−r,1 . . . tn−r,n          (P ◦ S)1 . . . . . . (P ◦ S)n      

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-23
SLIDE 23

Introduction Description Strategy Attack

Important observation 2

If we could regenerate r new linear combinations    p′

1

. . . p′

r

   =    t′

11

. . . t′

1n

. . . . . . t′

r1

. . . t′

rn

      (P ◦ S)1 . . . (P ◦ S)n   

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-24
SLIDE 24

Introduction Description Strategy Attack

Important observation 2

If we could regenerate r new linear combinations    p′

1

. . . p′

r

   =    t′

11

. . . t′

1n

. . . . . . t′

r1

. . . t′

rn

      (P ◦ S)1 . . . (P ◦ S)n    then adding them to Π ◦ P might complete a full C ∗ key : P′ =          p1 . . . pn−r p′

1

. p′

r

         =          t11 . . . t1n . . . . . . tn−r,1 tn−r,n t′

11

. . . t′

1n

. . t′

r1

. . . t′

rn

               (P ◦ S)1 . . . . . . (P ◦ S)n      

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-25
SLIDE 25

Introduction Description Strategy Attack

Important observation 3

This C ∗ public key P′ coincides with the original one P on the first n − r coordinates : Π ◦ P′ = Π ◦ P

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-26
SLIDE 26

Introduction Description Strategy Attack

Important observation 3

This C ∗ public key P′ coincides with the original one P on the first n − r coordinates : Π ◦ P′ = Π ◦ P We can find preimages by Π ◦ P by inverting P′ using Patarin’s attack

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-27
SLIDE 27

Introduction Description Strategy Attack

Important observation 3

This C ∗ public key P′ coincides with the original one P on the first n − r coordinates : Π ◦ P′ = Π ◦ P We can find preimages by Π ◦ P by inverting P′ using Patarin’s attack

Goal

Find a way to generate new linear combinations of the hidden function P ◦ S

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-28
SLIDE 28

Introduction Description Strategy Attack

Basic Strategy 2

A recomposing attack through injection of commuting maps ! We look for pairs of linear maps (M, N) "commuting" with the internal function : P ◦ M = N ◦ P

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-29
SLIDE 29

Introduction Description Strategy Attack

Basic Strategy 2

A recomposing attack through injection of commuting maps ! We look for pairs of linear maps (M, N) "commuting" with the internal function : P ◦ M = N ◦ P Then, composing Π ◦ P with the conjugate of M M = S−1 ◦ M ◦ S generates new linear combinations : (Π ◦ T ◦ P ◦ S) ◦ M = Π ◦ T ◦ (P ◦ M) ◦ S = Π ◦ T ◦ (N ◦ P) ◦ S = (Π ◦ T ◦ N) ◦ P ◦ S

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-30
SLIDE 30

Introduction Description Strategy Attack

In C ∗, P is multiplicative and Mξ : x → ξ.x are commuting maps. P ◦ Mξ = MP(ξ) ◦ P

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-31
SLIDE 31

Introduction Description Strategy Attack

In C ∗, P is multiplicative and Mξ : x → ξ.x are commuting maps. P ◦ Mξ = MP(ξ) ◦ P

Goal

Find a way to discover some maps Mξ conjugates of Mξ : Mξ = S−1 ◦ Mξ ◦ S

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-32
SLIDE 32

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

The Differential of C ∗

FGS05 : Differential Cryptanalysis for Multivariate Schemes

The differential of a quadratic function P is : DP(a, x) = P(a + x) − P(x) − P(a) + P(0) DP is bilinear and symmetric in (a, x) If P = T ◦ P ◦ S then DP = T ◦ DP(S, S)

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-33
SLIDE 33

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

The Differential of C ∗

FGS05 : Differential Cryptanalysis for Multivariate Schemes

The differential of a quadratic function P is : DP(a, x) = P(a + x) − P(x) − P(a) + P(0) DP is bilinear and symmetric in (a, x) If P = T ◦ P ◦ S then DP = T ◦ DP(S, S)

The differential of a C ∗ monomial

DP(a, x) = aqθx + axqθ = aqθ+1 x a

  • + aqθ+1 x

a qθ Letting L(ξ) = ξ + ξqθ, we have : DP(a, x) = P(a).L x a

  • Vivien Dubois, Pierre-Alain Fouque and Jacques Stern

Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-34
SLIDE 34

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

The Differential of C ∗

Notable Consequence

For any element ξ in ker(L), DP(a, ξ.a) = P(a).L ξ.a a

  • = P(a).L(ξ) = 0

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-35
SLIDE 35

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

The Differential of C ∗

Notable Consequence

For any element ξ in ker(L), DP(a, ξ.a) = P(a).L ξ.a a

  • = P(a).L(ξ) = 0

Therefore, the maps Mξ with ξ in ker(L) are the solutions of the linear functional equation : DP(a, M(a)) = 0

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-36
SLIDE 36

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

The Differential of C ∗

Notable Consequence

For any element ξ in ker(L), DP(a, ξ.a) = P(a).L ξ.a a

  • = P(a).L(ξ) = 0

Therefore, the maps Mξ with ξ in ker(L) are the solutions of the linear functional equation : DP(a, M(a)) = 0 Considering the differential of this equation, these maps satisfy DP(a, M(x)) + DP(M(a), x) = 0 Mξ with ξ in ker(L) are the skew-symmetric maps w.r.t DP.

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-37
SLIDE 37

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Skew-symmetric Maps w.r.t the Diff. of the C ∗ Monomial

The kernel of L(ξ) = ξ + ξqθ

The non-zero elements of ker(L) satisfy : ξqθ−1 = 1 There are gcd(qθ − 1, qn − 1) = qd − 1 such elements Therefore, ker(L) is a linear subspace of dimension d

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-38
SLIDE 38

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Skew-symmetric Maps w.r.t the Diff. of the C ∗ Monomial

The kernel of L(ξ) = ξ + ξqθ

The non-zero elements of ker(L) satisfy : ξqθ−1 = 1 There are gcd(qθ − 1, qn − 1) = qd − 1 such elements Therefore, ker(L) is a linear subspace of dimension d

Skew-symmetric Maps w.r.t the Diff. of the C ∗ Monomial

These maps are multiplications Mξ They are the solutions of the linear equation DP(a, M(x)) + DP(M(a), x) = 0 They form a subspace of dimension d = gcd(n, θ).

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-39
SLIDE 39

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Skew-symmetric Maps w.r.t the Diff. of the C ∗ Monomial

The kernel of L(ξ) = ξ + ξqθ

The non-zero elements of ker(L) satisfy : ξqθ−1 = 1 There are gcd(qθ − 1, qn − 1) = qd − 1 such elements Therefore, ker(L) is a linear subspace of dimension d

Skew-symmetric Maps w.r.t the Diff. of the C ∗ Monomial

These maps are multiplications Mξ They are the solutions of the linear equation DP(a, M(x)) + DP(M(a), x) = 0 They form a subspace of dimension d = gcd(n, θ). This subspace is non-trivial when d > 1, since scalar multiples

  • f the identity are useless.

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-40
SLIDE 40

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Skew-symmetric Maps w.r.t the Diff. of the C ∗ Pub.Key

They are the solutions of the linear equation : DP(M(a), x) + DP(a, M(x)) = 0 (1) where DP = T ◦ DP(S, S) Therefore, those are : Mξ = S−1 ◦ Mξ ◦ S where Mξ(x) = ξ.x and ξ ∈ ker(L) Equation (1) : ≃ n3 linear equations in n2 unknowns over Fq : (≃ n2/2 lin.indep (a, x) and n coord. of DP)

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-41
SLIDE 41

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Skew-symmetric Maps w.r.t the Diff. of the C ∗ Pub.Key

They are the solutions of the linear equation : DP(M(a), x) + DP(a, M(x)) = 0 (1) where DP = T ◦ DP(S, S) Therefore, those are : Mξ = S−1 ◦ Mξ ◦ S where Mξ(x) = ξ.x and ξ ∈ ker(L) Equation (1) : ≃ n3 linear equations in n2 unknowns over Fq : (≃ n2/2 lin.indep (a, x) and n coord. of DP) We might not need all coordinates of P to recover the Mξ !

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-42
SLIDE 42

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

If we are only given the first n − r coordinates of P : Π ◦ DP(M(a), x) + Π ◦ DP(a, M(x)) = 0 gives (n − r)n(n − 1)/2 linear equations in n2 unknowns

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-43
SLIDE 43

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

If we are only given the first n − r coordinates of P : Π ◦ DP(M(a), x) + Π ◦ DP(a, M(x)) = 0 gives (n − r)n(n − 1)/2 linear equations in n2 unknowns The skew-symmetric maps Mξ are solutions.

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-44
SLIDE 44

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

If we are only given the first n − r coordinates of P : Π ◦ DP(M(a), x) + Π ◦ DP(a, M(x)) = 0 gives (n − r)n(n − 1)/2 linear equations in n2 unknowns The skew-symmetric maps Mξ are solutions. We expect no other solutions when : (n − r)n(n − 1) 2 ≥ n2 − d

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-45
SLIDE 45

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

If we are only given the first n − r coordinates of P : Π ◦ DP(M(a), x) + Π ◦ DP(a, M(x)) = 0 gives (n − r)n(n − 1)/2 linear equations in n2 unknowns The skew-symmetric maps Mξ are solutions. We expect no other solutions when : (n − r)n(n − 1) 2 ≥ n2 − d Hence, heuristically, the Mξ are the only solutions up to : r ∗

max = n −

  • 2 n2 − d

n(n − 1)

  • = n − 3

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-46
SLIDE 46

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

The actual value rmax is very close to the heuristical r ∗

max :

n 36 36 38 39 39 40 42 42 44 θ 8 12 10 13 9 8 12 14 12 d 4 12 2 13 3 8 6 14 4 r ∗

max

33 33 35 36 36 37 39 39 41 rmax 33 32 35 35 36 37 39 38 41

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-47
SLIDE 47

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

The actual value rmax is very close to the heuristical r ∗

max :

n 36 36 38 39 39 40 42 42 44 θ 8 12 10 13 9 8 12 14 12 d 4 12 2 13 3 8 6 14 4 r ∗

max

33 33 35 36 36 37 39 39 41 rmax 33 32 35 35 36 37 39 38 41 The skew-symmetric maps can be recovered from as few as 3 or 4 coordinates of the public key !

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-48
SLIDE 48

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Recovering a Full C ∗ Public Key

Using a single non-trivial Mξ, up to r = n/2

1 We complete Π ◦ P using r coordinates of Π ◦ P ◦ Mξ.

Π ◦ P (Π ◦ P ◦ Mξ)1→r = Π ◦ T (Π ◦ T ◦ MP(ξ))1→r

  • P ◦ S

2 We can check that this is a full C ∗ public key since Patarin’s

attack works again.

n 36 36 38 39 39 40 42 42 44 θ 8 12 10 13 9 8 12 14 12 d 4 12 2 13 3 8 6 14 4 r 11 11 11 12 12 12 13 13 13 C ∗− → C ∗ 57s 57s 94s 105s 90s 105s 141s 155s 155s

Note : parameters are close to those of SFLASHv2, with the same q = 27.

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-49
SLIDE 49

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Recovering a Full C ∗ Public Key

Using a whole basis of Mξ

Since we have d(n − r) coordinates available, the overall bound is : r ≤ n

  • 1 − 1

d

  • n

36 36 38 39 39 40 42 42 44 θ 8 12 10 13 9 8 12 14 12 d 4 12 2 13 3 8 6 14 4 r 27 32 19 35 26 35 35 38 33 C ∗− → C ∗ 65s 51s 112s 79s 107s 95s 134s 117s 202s

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-50
SLIDE 50

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Conclusion

C ∗− schemes with d > 1 are insecure up to r = n(1 − 1

d )

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-51
SLIDE 51

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Conclusion

C ∗− schemes with d > 1 are insecure up to r = n(1 − 1

d )

2 3 1 4 5 6 UNKNOWN SECURITY

FLASH SFLASHv2 SFLASHv3

d r n n/2 n−n/d

INSECURE

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-52
SLIDE 52

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Conclusion

C ∗− schemes with d > 1 are insecure up to r = n(1 − 1

d )

The attack does not apply to the case d = 1

2 3 1 4 5 6 UNKNOWN SECURITY

FLASH SFLASHv2 SFLASHv3

d r n n/2 n−n/d

INSECURE

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-53
SLIDE 53

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Conclusion

C ∗− schemes with d > 1 are insecure up to r = n(1 − 1

d )

The attack does not apply to the case d = 1 (but a different way to find multiplications breaks these cases : see Crypto07, joint work with Adi Shamir)

2 3 1 4 5 6 UNKNOWN SECURITY

FLASH SFLASHv2 SFLASHv3

d r n n/2 n−n/d

INSECURE

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters

slide-54
SLIDE 54

Introduction Description Strategy Attack Skew-symmetric Maps Recovering a full public key

Thank you for your attention ! Questions ?

Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters