Cryptanalysis of Reduced-Round SipHash

被引:1
|
作者
He, Le [1 ]
Yu, Hongbo [1 ,2 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Shuangqing Rd, Beijing 100084, Peoples R China
[2] Zhongguancun Lab, Beijing, Peoples R China
来源
COMPUTER JOURNAL | 2023年 / 67卷 / 03期
关键词
SipHash; distinguishing attack; key recovery; truncated differential;
D O I
10.1093/comjnl/bxad026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
SipHash is a family of ARX-based MAC algorithms optimized for short inputs. So far, a lot of implementations and applications for SipHash have been proposed, whereas the cryptanalysis of SipHash still lags behind. In this paper, we study the property of truncated differential in reduced-round SipHash. By exhaustively testing all kinds of 1-bit input differences, we find out the greatest differential biases from corresponding output bits through 3 or 4 SipRounds. Making use of these results, we construct distinguishers for SipHash-2-1 and SipHash-2-2 with practical complexities of 2(12 )and 2(36), respectively. However, one limitation of the latter is that it begins with 1-bit input differences on the most significant message bit, which means it can only work when neglecting the padding rules of SipHash. Furthermore, we reveal the relations between the value of output bias and the difference after the first modular addition step, which is directly determined by corresponding key bits. Based on these relations, we propose a key recovery method for SipHash-2-1 that can obtain a significantly nonuniform distribution of the 128-bit secret key. It is summarized that about 97% of random keys can be fully recovered under this method within a complexity of 2(83).
引用
收藏
页码:875 / 883
页数:9
相关论文
共 50 条
  • [1] Cryptanalysis of Reduced-Round Whirlwind
    Ma, Bingke
    Li, Bao
    Hao, Ronglin
    Li, Xiaoqian
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 20 - 38
  • [2] Cryptanalysis of Reduced-Round DASH
    刘树生
    龚征
    王立斌
    Journal of Computer Science & Technology, 2013, 28 (01) : 159 - 164
  • [3] Cryptanalysis of reduced-round MISTY
    Kühn, U
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 325 - 339
  • [4] Cryptanalysis of Reduced-Round SPECK
    Ren, Jiongjiong
    Chen, Shaozhen
    IEEE ACCESS, 2019, 7 : 63045 - 63056
  • [5] Cryptanalysis of Reduced-Round DASH
    Shu-Sheng Liu
    Zheng Gong
    Li-Bin Wang
    Journal of Computer Science and Technology, 2013, 28 : 159 - 164
  • [6] Cryptanalysis of Reduced-Round DASH
    Liu, Shu-Sheng
    Gong, Zheng
    Wang, Li-Bin
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (01) : 159 - 164
  • [7] Integral Cryptanalysis of Reduced-round KASUMI
    Sugio, Nobuyuki
    Igarashi, Yasutaka
    Kaneko, Toshinobu
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 447 - 451
  • [8] Differential cryptanalysis of reduced-round PRESENT
    Wang, Meiqin
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 40 - 49
  • [9] Integral Cryptanalysis on Reduced-Round KASUMI
    Sugio, Nobuyuki
    Igarashi, Yasutaka
    Hongo, Sadayuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (09) : 1309 - 1316
  • [10] Integral cryptanalysis on reduced-round PUFFIN
    Zhao, Guangyao
    Cheng, Lei
    Li, Ruilin
    Li, Chao
    Sun, Bing
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2015, 37 (06): : 129 - 134