Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol

Author:

Ni Jianqiang1ORCID,Zhang Jianhui2,Wang Gaoli1,Li Rui3,Shen Yanzhao4

Affiliation:

1. Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai 200062, China

2. R&D Center, Shandong Luruan Digital Technology Co., Ltd., Jinan 250101, China

3. Inspur Academy of Science and Technology, Jinan 250014, China

4. Shandong Institute of Blockchain, Jinan 250101, China

Abstract

The rise of modern cryptographic protocols such as Zero-Knowledge proofs and secure Multi-party Computation has led to an increased demand for a new class of symmetric primitives. Unlike traditional platforms such as servers, microcontrollers, and desktop computers, these primitives are designed to be implemented in arithmetical circuits. In terms of security evaluation, arithmetization-oriented primitives are more complex compared to traditional symmetric cryptographic primitives. The arithmetization-oriented permutation Grendel employs the Legendre Symbol to increase the growth of algebraic degrees in its nonlinear layer. To analyze the security of Grendel thoroughly, it is crucial to investigate its resilience against algebraic attacks. This paper presents a preimage attack on the sponge hash function instantiated with the complete rounds of the Grendel permutation, employing algebraic methods. A technique is introduced that enables the elimination of two complete rounds of substitution permutation networks (SPN) in the sponge hash function without significant additional cost. This method can be combined with univariate root-finding techniques and Gröbner basis attacks to break the number of rounds claimed by the designers. By employing this strategy, our attack achieves a gain of two additional rounds compared to the previous state-of-the-art attack. With no compromise to its security margin, this approach deepens our understanding of the design and analysis of such cryptographic primitives.

Funder

National Key Research and Development Program of China

National Natural Science Foundation of China

Shanghai Trusted Industry Internet Software Collaborative Innovation Center

Publisher

MDPI AG

Subject

Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)

Reference46 articles.

1. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity;Cheon;Advances in Cryptology—ASIACRYPT 2016, Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, 4–8 December 2016, Proceedings, Part I,2016

2. Feistel Structures for MPC, and More;Sako;Computer Security—ESORICS 2019, Proceedings of the 24th European Symposium on Research in Computer Security, Luxembourg, 23–27 September 2019, Proceedings, Part II,2019

3. On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy;Canteaut;Advances in Cryptology—EUROCRYPT 2020, Proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10–14 May 2020, Proceedings, Part II,2020

4. Bailey, M., and Greenstadt, R. (2021). USENIX Security 2021, Proceedings of the 30th USENIX Security Symposium, 11–13 August 2021, Springer. USENIX Association.

5. Masta: An HE-Friendly Cipher Using Modular Arithmetic;Ha;IEEE Access,2020

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3