Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems

Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Yu Sasaki, Yosuke Todo, Friedrich Wiemer

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

The security and performance of many integrity proof systems like SNARKs, STARKs and Bulletproofs highly depend on the underlying hash function. For this reason several new proposals have recently been developed. These primitives obviously require an in-depth security evaluation, especially since their implementation constraints have led to less standard design approaches. This work compares the security levels offered by two recent families of such primitives, namely GMiMC and HadesMiMC. We exhibit low-complexity distinguishers against the GMiMC and HadesMiMC permutations for most parameters proposed in recently launched public challenges for STARK-friendly hash functions. In the more concrete setting of the sponge construction corresponding to the practical use in the ZK-STARK protocol, we present a practical collision attack on a round-reduced version of GMiMC and a preimage attack on some instances of HadesMiMC. To achieve those results, we adapt and generalize several cryptographic techniques to fields of odd characteristic.

Originalspracheenglisch
TitelAdvances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings
Redakteure/-innenDaniele Micciancio, Thomas Ristenpart
Herausgeber (Verlag)Springer
Seiten299-328
Seitenumfang30
ISBN (Print)9783030568764
DOIs
PublikationsstatusVeröffentlicht - 1 Jan. 2020

Publikationsreihe

NameLecture Notes in Computer Science
Band12172

ASJC Scopus subject areas

  • Theoretische Informatik
  • Allgemeine Computerwissenschaft

Fingerprint

Untersuchen Sie die Forschungsthemen von „Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren