Improved Rebound Attack on the Finalist Grøstl
Jérémy Jean1 María Naya-Plasencia2 Thomas Peyrin3
1École Normale Supérieure, France 2University of Versailles, France 3Nanyang Technological University, Singapore
FSE’2012 – March 19, 2012
Improved Rebound Attack on the Finalist Grstl Jrmy Jean 1 Mara - - PowerPoint PPT Presentation
Improved Rebound Attack on the Finalist Grstl Jrmy Jean 1 Mara Naya-Plasencia 2 Thomas Peyrin 3 1 cole Normale Suprieure, France 2 University of Versailles, France 3 Nanyang Technological University, Singapore FSE2012 March 19,
1École Normale Supérieure, France 2University of Versailles, France 3Nanyang Technological University, Singapore
FSE’2012 – March 19, 2012
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
◮
◮
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 2/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
◮
◮
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 3/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
◮
◮
AddRoundConstant SubBytes ShiftBytes MixBytes
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 4/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 5/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
◮
◮
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 6/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
◮
◮
◮
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 7/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
◮
◮
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 8/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 9/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 9/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 10/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 11/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 12/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb S0 S1 S2 S3 S3 S4 S5 S6 S6 S7 S8 S9 S9 S10 S11 S12
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 13/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb S0 S1 S2 S3 S3 S4 S5 S6 S6 S7 S8 S9 S9 S10 S11 S12
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 13/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb S0 S1 S2 S3 S3 S4 S5 S6 S6 S7 S8 S9 S9 S10 S11 S12
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 13/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb S0 S1 S2 S3 S3 S4 S5 S6 S6 S7 S8 S9 S9 S10 S11 S12
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 13/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 14/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i like this:
L′
1 L′ 2 L′ 3 L′ 4 L′ 5 L′ 6 L′ 7 L′ 8
L1 L2 L3 L4 L5 L6 L7 L8
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 15/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i.
L′
1 L′ 2 L′ 3 L′ 4
L8
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 16/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
1
L1 L2 L3 L4 L5 L6 L7 L8
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 17/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i exists with
L′
5 L′ 6 L′ 7 L′ 8
L8
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 18/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
1, L′ 2, L′ 3, L′ 4) and each gives
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 19/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 20/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 21/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb
S0 S1 S2 S3 S3 S4 S5 S6 S6 S7 S8 S9 S9 S10 S11 S12
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 22/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb
S0 S1 S2 S3 S3 S4 S5 S6 S6 S7 S8 S9 S9 S10 S11 S12
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 22/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb
S0 S1 S2 S3 S3 S4 S5 S6 S6 S7 S8 S9 S9 S10 S11 S12
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 22/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
SB Sh Mb SB Sh Mb SB Sh Mb SB Sh Mb
S0 S1 S2 S3 S3 S4 S5 S6 S6 S7 S8 S9 S9 S10 S11 S12
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 22/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 23/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
1, . . . , L′ 16.
24/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
L′
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 24/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆
L′
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256 Current Probability 1 L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256 Current Probability 1 Next step: L′
5, L′ 6, L′ 7, L′ 8.L′ 4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256 Current Probability 1 L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256 Current Probability 1 Next step: L1, L16.L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256 Current Probability 1 Next step: L′
4.
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256 Current Probability 1 L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256 Current Probability 1 Next step: L15.L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256 Current Probability 1 Next step: L6.L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16 Current Probability 1 L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16 Current Probability 1 Next step: L′
9.
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16 Current Probability 1 L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16 Current Probability 1 Next step: L14.L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16 Current Probability 1 Next step: L′
3.L′ 4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16 Current Probability 1 L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16 Current Probability 1 Next step: L1.L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16 Current Probability 1 L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16 Current Probability 1 Next step: L′
1.L′ 4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
⋆ ⋆
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 1 L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 1 Next step: L13.L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 1 Next step: L′
2.L′ 4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 1 L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 1 Next step: L7, L16.L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 1 L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 1 Next step: L′
10, L′ 11.L′ 4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 2−8·(1) L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 2−8·(1) Next step: L8, L9, L11, L15.L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 2−8·(1+2) L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 2−8·(1+2) Next step: L′
12.L′ 4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 2−8·(1+2+3) L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 2−8·(1+2+3) Next step: L10, L12.L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 2−8·(1+2+3) L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 2−8·(1+2+3) Next step: L′
2.L′ 16
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 2−8·(1+2+3+5) L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 2−8·(1+2+3+5) Next step: L′
13, L′ 14, L′ 15.L′ 16
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Current Complexity 2256+16+8 Current Probability 2−8·(1+2+3+5+8+8+8) L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
i
Li Number of different differences in each Li 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 3 4 3 4 5 6 8 6 5 4 3 4 3 2 2 2
Final Complexity 2256+16+8 = 2280 Final Probability 2−8·(1+2+3+5+8+8+8) = 2−280 The End.L′
4
Legend Known value and difference Known difference ⋆ Guessed value and difference Highlight current step
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 25/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 26/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
◮
◮
◮
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 27/27
Grøstl & SHA-3 Cryptanalysis Techniques Grøstl-256 Grøstl-512 Conclusion
◮
◮
◮
FSE’2012 – J. Jean, M. Naya-Plasencia, T. Peyrin – Improved Rebound Attack on the Finalist Grostl 27/27