The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
Jérémy Jean1 joint work with: Jian Guo1 Gaëtan Leurent2 Thomas Peyrin1 Lei Wang1
1Nanyang Technological University, Singapore 2INRIA, France
The Usage of Counter Revisited: Second-Preimage Attack on New - - PowerPoint PPT Presentation
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jrmy Jean 1 joint work with: Jian Guo 1 Gatan Leurent 2 Thomas Peyrin 1 Lei Wang 1 1 Nanyang Technological University, Singapore 2 INRIA, France
1Nanyang Technological University, Singapore 2INRIA, France
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 2/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
m1 h0 = IV 512 N Σ h1
m2 512 . . . . . . h2 . . .
mt ht−1 512
m ht |M|
ht+1
ht+2 h Stage 1 Stage 2 Stage 3
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 3/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 4/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 5/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 5/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 5/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 5/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 5/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
def
def
∆(i)
∆(i+1)
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 6/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 7/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
512 − s bits s bits < i > < i + 1 > = < i ⊕ (i + 1) > ∆(i) 512 − s bits s bits j < i > j < i + 1 > = < i ⊕ (i + 1) > ∆(i + j · 2s)
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 8/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
2s
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 9/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 10/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 10/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
h⋄ h0 1 m0 1 h1 1 m1 1
F2s −2 F2s −3◦···◦F1 F0
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 11/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
h⋄ h0 1 m0 1 h1 1 m1 1
F2s −2 F2s −3◦···◦F1 F0
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 12/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
IV h G1 ◦ (F2s−2 ◦ · · · ◦ F0) G2 ◦ (F2s−2 ◦ · · · ◦ F0) F2s−2 ◦ · · · F0 F Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 l′ × 2s t − l′ × 2s d = 2s − 1 1 1024 L 1 h⋄ 2d-diamond h′
⋄
mց
⋄
L random blocks . . . ˜ h′ mր
⋄
IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
⋄ to hit h′ ⋄.
⋄ to hit the diamond.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 13/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
IV h G1 ◦ (F2s−2 ◦ · · · ◦ F0) G2 ◦ (F2s−2 ◦ · · · ◦ F0) F2s−2 ◦ · · · F0 F Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 l′ × 2s t − l′ × 2s d = 2s − 1 1 1024 L 1 h⋄ 2d-diamond h′
⋄
mց
⋄
L random blocks . . . ˜ h′ mր
⋄
IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
⋄ to hit h′ ⋄.
⋄ to hit the diamond.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 13/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
IV h G1 ◦ (F2s−2 ◦ · · · ◦ F0) G2 ◦ (F2s−2 ◦ · · · ◦ F0) F2s−2 ◦ · · · F0 F Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 l′ × 2s t − l′ × 2s d = 2s − 1 1 1024 L 1 h⋄ 2d-diamond h′
⋄
mց
⋄
L random blocks . . . ˜ h′ mր
⋄
IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
⋄ to hit h′ ⋄.
⋄ to hit the diamond.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 13/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
IV h G1 ◦ (F2s−2 ◦ · · · ◦ F0) G2 ◦ (F2s−2 ◦ · · · ◦ F0) F2s−2 ◦ · · · F0 F Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 l′ × 2s t − l′ × 2s d = 2s − 1 1 1024 L 1 h⋄ 2d-diamond h′
⋄
mց
⋄
L random blocks . . . ˜ h′ mր
⋄
IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
⋄ to hit h′ ⋄.
⋄ to hit the diamond.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 13/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
IV h G1 ◦ (F2s−2 ◦ · · · ◦ F0) G2 ◦ (F2s−2 ◦ · · · ◦ F0) F2s−2 ◦ · · · F0 F Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 l′ × 2s t − l′ × 2s d = 2s − 1 1 1024 L 1 h⋄ 2d-diamond h′
⋄
mց
⋄
L random blocks . . . ˜ h′ mր
⋄
IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
⋄ to hit h′ ⋄.
⋄ to hit the diamond.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 13/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
IV h G1 ◦ (F2s−2 ◦ · · · ◦ F0) G2 ◦ (F2s−2 ◦ · · · ◦ F0) F2s−2 ◦ · · · F0 F Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 l′ × 2s t − l′ × 2s d = 2s − 1 1 1024 L 1 h⋄ 2d-diamond h′
⋄
mց
⋄
L random blocks . . . ˜ h′ mր
⋄
IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
⋄ to hit h′ ⋄.
⋄ to hit the diamond.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 13/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
IV h G1 ◦ (F2s−2 ◦ · · · ◦ F0) G2 ◦ (F2s−2 ◦ · · · ◦ F0) F2s−2 ◦ · · · F0 F Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 l′ × 2s t − l′ × 2s d = 2s − 1 1 1024 L 1 h⋄ 2d-diamond h′
⋄
mց
⋄
L random blocks . . . ˜ h′ mր
⋄
IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
⋄ to hit h′ ⋄.
⋄ to hit the diamond.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 13/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
IV h G1 ◦ (F2s−2 ◦ · · · ◦ F0) G2 ◦ (F2s−2 ◦ · · · ◦ F0) F2s−2 ◦ · · · F0 F Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 l′ × 2s t − l′ × 2s d = 2s − 1 1 1024 L 1 h⋄ 2d-diamond h′
⋄
mց
⋄
L random blocks . . . ˜ h′ mր
⋄
IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
⋄ to hit h′ ⋄.
⋄ to hit the diamond.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 13/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
2s
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 14/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
IV h Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 N 1 1024 L h∗ h′
∗
m∗ expandable message: length L . . . IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
∗.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 15/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
2s ⌋).
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 16/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 17/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 18/19
Introduction Our observation Diamond attack Expandable message attack Conclusion
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 18/19
Expandable message attack Bibliography
7
6
5
4
3
2
1
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 19/19
Expandable message attack Bibliography
3, m3) of lengths (1, 23 + 1) colliding on x3.
2, m2) of lengths (1, 22 + 1) colliding on x2.
3m′ 2
3m2
2
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 20/19
Expandable message attack Bibliography
IV h Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 N 1 1024 L h∗ h′
∗
m∗ expandable message: length L . . . IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
∗.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 21/19
Expandable message attack Bibliography
IV h Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 N 1 1024 L h∗ h′
∗
m∗ expandable message: length L . . . IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
∗.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 21/19
Expandable message attack Bibliography
IV h Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 N 1 1024 L h∗ h′
∗
m∗ expandable message: length L . . . IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
∗.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 21/19
Expandable message attack Bibliography
IV h Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 N 1 1024 L h∗ h′
∗
m∗ expandable message: length L . . . IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
∗.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 21/19
Expandable message attack Bibliography
IV h Fp−1 ◦ · · · ◦ F0 |M| Σ 2s 2s . . . . . . p 1 1 N 1 1024 L h∗ h′
∗
m∗ expandable message: length L . . . IV h0 h′ h1 h′
1
h511 h′
511
˜ h 20 21 2511
∗.
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 21/19
Expandable message attack Bibliography
2s ⌋).
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 22/19
Expandable message attack Bibliography
SAC 2014 – J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang – Cryptanalysis of Streebog 19/19