Cryptanalysis of Reduced-Round SipHash

被引:1
|
作者
He, Le [1 ]
Yu, Hongbo [1 ,2 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Shuangqing Rd, Beijing 100084, Peoples R China
[2] Zhongguancun Lab, Beijing, Peoples R China
来源
COMPUTER JOURNAL | 2023年 / 67卷 / 03期
关键词
SipHash; distinguishing attack; key recovery; truncated differential;
D O I
10.1093/comjnl/bxad026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
SipHash is a family of ARX-based MAC algorithms optimized for short inputs. So far, a lot of implementations and applications for SipHash have been proposed, whereas the cryptanalysis of SipHash still lags behind. In this paper, we study the property of truncated differential in reduced-round SipHash. By exhaustively testing all kinds of 1-bit input differences, we find out the greatest differential biases from corresponding output bits through 3 or 4 SipRounds. Making use of these results, we construct distinguishers for SipHash-2-1 and SipHash-2-2 with practical complexities of 2(12 )and 2(36), respectively. However, one limitation of the latter is that it begins with 1-bit input differences on the most significant message bit, which means it can only work when neglecting the padding rules of SipHash. Furthermore, we reveal the relations between the value of output bias and the difference after the first modular addition step, which is directly determined by corresponding key bits. Based on these relations, we propose a key recovery method for SipHash-2-1 that can obtain a significantly nonuniform distribution of the 128-bit secret key. It is summarized that about 97% of random keys can be fully recovered under this method within a complexity of 2(83).
引用
收藏
页码:875 / 883
页数:9
相关论文
共 50 条
  • [21] Cryptanalysis of Reduced-Round MIBS Block Cipher
    Bay, Asli
    Nakahara, Jorge, Jr.
    Vaudenay, Serge
    CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 1 - 19
  • [22] Integral Cryptanalysis of Reduced-Round Tweakable TWINE
    ElSheikh, Muhammad
    Youssef, Amr M.
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 485 - 504
  • [23] Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore
    Zhang, Li
    Wu, Wenling
    Mao, Yongxia
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 61 - 77
  • [24] Multiple impossible differential cryptanalysis of reduced-round NBC
    Liang, Lifang
    Du, Xiaoni
    CRYPTOLOGIA, 2024,
  • [25] Cryptanalysis on Reduced-Round 3D and Saturnin
    Zhang, Li
    Wu, Wenling
    Zheng, YaFei
    Wang, Bolin
    COMPUTER JOURNAL, 2023, 66 (04): : 1017 - 1029
  • [26] Impossible differential cryptanalysis of reduced-round ARIA and Camellia
    Wu, Wen-Ling
    Zhang, Wen-Tao
    Feng, Deng-Guo
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (03) : 449 - 456
  • [27] New Impossible Differential Cryptanalysis of Reduced-Round Camellia
    Li, Leibo
    Chen, Jiazhe
    Jia, Keting
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 26 - +
  • [28] Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia
    吴文玲
    张文涛
    冯登国
    Journal of Computer Science & Technology, 2007, (03) : 449 - 456
  • [29] Biased differential distinguisher - Cryptanalysis of reduced-round SKINNY
    Dunkelman, Orr
    Huang, Senyang
    Lambooij, Eran
    Perle, Stav
    INFORMATION AND COMPUTATION, 2021, 281
  • [30] Impossible Differential Cryptanalysis of reduced-round TEA and XTEA
    Hajari, Masroor
    Azimi, Seyyed Arash
    Aghdaie, Poorya
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 58 - 63