[Resource Topic] 2023/1453: Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies

Welcome to the resource topic for 2023/1453

Title:
Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies

Authors: Qinggan Fu, Ye Luo, Qianqian Yang, Ling Song

Abstract:

Ascon, a family of algorithms that supports hashing and authenticated encryption, is the winner of the NIST Lightweight Cryptography Project. In this paper, we propose an improved preimage attack against 2-round Ascon-XOF-64 with a complexity of 2^{32} via a better guessing strategy. Furthermore, in order to find a good guessing strategy efficiently, we build a MILP model and successfully extend the attack to 3 rounds. The time complexity is 2^{53} when IV=0, while for the real IV, the attack still works and the time complexity is 2^{51}. Additionally, we also investigate the resistance of Ascon-HASH against collision attacks. We introduce the linearization of the inverse of S-boxes and then propose a practical free-start collision attack on 3-round Ascon-HASH using a differential trail searched dedicatedly. Furthermore, We construct different 2-round connectors using the linearization of the inverse of S-boxes and successfully extend the collision attack to 4 rounds and 5 rounds of Ascon-HASH with complexities of 2^{21} and 2^{41} respectively. Although our attacks do not compromise the security of the full 12-round Ascon-XOF and Ascon-HASH, they provide some insights into Ascon’s security.

ePrint: https://eprint.iacr.org/2023/1453

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .