[Resource Topic] 2024/1408: Multiple-Tweak Differential Attack Against SCARF

Welcome to the resource topic for 2024/1408

Title:
Multiple-Tweak Differential Attack Against SCARF

Authors: Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo

Abstract:

In this paper, we present the first third-party cryptanalysis of SCARF, a tweakable low-latency block cipher designed to thwart contention-based cache attacks through cache randomization. We focus on multiple-tweak differential attacks, exploiting biases across multiple tweaks. We establish a theoretical framework explaining biases for any number of rounds and verify this framework experimentally. Then, we use these properties to develop a key recovery attack on 7-round SCARF with a time complexity of (2^{76}), achieving a 98.9% success rate in recovering the 240-bit secret key. Additionally, we introduce a distinguishing attack on the full 8-round SCARF in a multi-key setting, with a complexity of (c \times 2^{67.55}), demonstrating that SCARF does not provide 80-bit security under these conditions. We also explore whether our approach could be extended to the single-key model and discuss the implications of different S-box choices on the attack success.

ePrint: https://eprint.iacr.org/2024/1408

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .