Practical Cube Attack against Nonce-Misused Ascon
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort. As this competition comes to an end, we analyse the security of this algo...
Saved in:
Published in | IACR Transactions on Symmetric Cryptology Vol. 2022; no. 4; pp. 120 - 144 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Ruhr Universität Bochum
07.12.2022
Ruhr-Universität Bochum |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort. As this competition comes to an end, we analyse the security of this algorithm against cube attacks. We present a practical cube attack against the full 6-round encryption in Ascon in the nonce-misuse setting. We note right away that this attack does not violate the security claims made by the designers of Ascon, due to this setting.Our cryptanalysis is a conditional cube attack that is capable of recovering the full capacity in practical time; but for Ascon-128, its extension to a key recovery or a forgery is still an open question. First, a careful analysis of the maximum-degree terms in the algebraic normal form of the Ascon permutation allows us to derive linear equations in half of the capacity bits given enough cube sums of dimension 32. Then, depending on the results of this first phase, we identify smaller-degree cubes that allow us to recover the remaining half of the capacity. Overall, our cryptanalysis has a complexity of about 240 adaptatively chosen plaintexts, and about 240 calls to the permutation. We have implemented the full attack and our experiments confirm our claims.Our results are built on a theoretical framework which allows us to easily identify monomials whose cube-sums provide linear equations in the capacity bits. The coefficients of these monomials have a more general form than those used in the previous attacks against Ascon, and our method enables us to re-frame previous results in a simpler form. Overall, it enables to gain a deeper understanding of the properties of the permutation, and in particular of its S-box, that make such state-recoveries possible. |
---|---|
AbstractList | Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort. As this competition comes to an end, we analyse the security of this algorithm against cube attacks. We present a practical cube attack against the full 6-round encryption in Ascon in the nonce-misuse setting. We note right away that this attack does not violate the security claims made by the designers of Ascon, due to this setting. Our cryptanalysis is a conditional cube attack that is capable of recovering the full capacity in practical time; but for Ascon-128, its extension to a key recovery or a forgery is still an open question. First, a careful analysis of the maximum-degree terms in the algebraic normal form of the Ascon permutation allows us to derive linear equations in half of the capacity bits given enough cube sums of dimension 32. Then, depending on the results of this first phase, we identify smaller-degree cubes that allow us to recover the remaining half of the capacity. Overall, our cryptanalysis has a complexity of about 240 adaptatively chosen plaintexts, and about 240 calls to the permutation. We have implemented the full attack and our experiments confirm our claims. Our results are built on a theoretical framework which allows us to easily identify monomials whose cube-sums provide linear equations in the capacity bits. The coefficients of these monomials have a more general form than those used in the previous attacks against Ascon, and our method enables us to re-frame previous results in a simpler form. Overall, it enables to gain a deeper understanding of the properties of the permutation, and in particular of its S-box, that make such state-recoveries possible. |
Author | Perrin, Léo Baudrin, Jules Canteaut, Anne |
Author_xml | – sequence: 1 givenname: Jules surname: Baudrin fullname: Baudrin, Jules – sequence: 2 givenname: Anne surname: Canteaut fullname: Canteaut, Anne – sequence: 3 givenname: Léo surname: Perrin fullname: Perrin, Léo |
BackLink | https://inria.hal.science/hal-03901680$$DView record in HAL |
BookMark | eNqFkMlKBDEQhoMouL6C9NVDj9k6C3gZBjcYl4OCt1CdRaNtRzpxwLe3Z0ZBvXiqoviX4ttFm33qPUKHBE-4aJQ4LinbyYJiSieRTwjFNeF8A-3QhuiaSPaw-WPfRgc5P2OMqdJMcL2DyO0AtkQLXTV7b301LQXsSwWPEPtcquvUW19fxfyevaum2aZ-H20F6LI_-Jp76P7s9G52Uc9vzi9n03ltOWal1iJw6YJrLcYcGkqkpI44BxxLCTgoorVrKdeMhtYq3wamPFHM2lHbAGF76HKd6xI8m7chvsLwYRJEszqk4dHAMH7eeSMkd04wCY0X3HmlIEilObfeSoqbMGYdrbOeoPsVdTGdm-UNM42JUHix7D1Za-2Qch58MDYWKDH1ZYDYGYLNirxZkjcr8iZyM5I3I_nRLv7Yv_v-MX4CgY6Kjw |
CitedBy_id | crossref_primary_10_1109_ACCESS_2022_3223991 crossref_primary_10_1007_s11786_024_00594_x crossref_primary_10_3390_app131810345 crossref_primary_10_1007_s00200_023_00602_w |
ContentType | Journal Article |
Copyright | Distributed under a Creative Commons Attribution 4.0 International License |
Copyright_xml | – notice: Distributed under a Creative Commons Attribution 4.0 International License |
DBID | AAYXX CITATION 1XC DOA |
DOI | 10.46586/tosc.v2022.i4.120-144 |
DatabaseName | CrossRef Hyper Article en Ligne (HAL) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2519-173X |
EndPage | 144 |
ExternalDocumentID | oai_doaj_org_article_674dd637a5e64de88af78944cec7205f oai_HAL_hal_03901680v1 10_46586_tosc_v2022_i4_120_144 |
GroupedDBID | AAYXX ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION GROUPED_DOAJ 1XC |
ID | FETCH-LOGICAL-c403t-96f47dfdbc004a521772d1dda4077a0f8199db24932fbc8ebf38e183cc5215a13 |
IEDL.DBID | DOA |
ISSN | 2519-173X |
IngestDate | Wed Aug 27 01:13:59 EDT 2025 Wed Jul 23 06:30:30 EDT 2025 Tue Jul 01 03:41:35 EDT 2025 Thu Apr 24 23:09:13 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Keywords | Cube attack Ascon Nonce-misuse CAESAR Lightweight cryptography Algebraic attack |
Language | English |
License | http://creativecommons.org/licenses/by/4.0 Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c403t-96f47dfdbc004a521772d1dda4077a0f8199db24932fbc8ebf38e183cc5215a13 |
ORCID | 0009-0004-5844-2845 0000-0002-6292-8336 |
OpenAccessLink | https://doaj.org/article/674dd637a5e64de88af78944cec7205f |
PageCount | 25 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_674dd637a5e64de88af78944cec7205f hal_primary_oai_HAL_hal_03901680v1 crossref_citationtrail_10_46586_tosc_v2022_i4_120_144 crossref_primary_10_46586_tosc_v2022_i4_120_144 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-12-07 |
PublicationDateYYYYMMDD | 2022-12-07 |
PublicationDate_xml | – month: 12 year: 2022 text: 2022-12-07 day: 07 |
PublicationDecade | 2020 |
PublicationTitle | IACR Transactions on Symmetric Cryptology |
PublicationYear | 2022 |
Publisher | Ruhr Universität Bochum Ruhr-Universität Bochum |
Publisher_xml | – name: Ruhr Universität Bochum – name: Ruhr-Universität Bochum |
SSID | ssj0002893649 |
Score | 2.270459 |
Snippet | Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the... |
SourceID | doaj hal crossref |
SourceType | Open Website Open Access Repository Enrichment Source Index Database |
StartPage | 120 |
SubjectTerms | algebraic attack Ascon CAESAR Computer Science Cryptography and Security cube attack lightweight cryptography nonce-misuse |
Title | Practical Cube Attack against Nonce-Misused Ascon |
URI | https://inria.hal.science/hal-03901680 https://doaj.org/article/674dd637a5e64de88af78944cec7205f |
Volume | 2022 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PT8IwFG4MJy9Go0b8lcV4HbRr13ZHJBJihJMk3Jr-VNSAcYO_39cNCJy4eH1pt_V73b73dX2vCD0KLjwJDKc6JzZlRodUSiPTAOEGpSTzmMfk5NGYDyfsZZpPd476invCmvLADXBdLphznAqde86cl1IHIQvGrLciw3mIX1_gvB0x9dn8PqOcFU1KMAOW5d1qUdrOCrR-1pmxDgHVBFpij43qov3AMR-bNdWaYwan6GQdHCa95qHO0JGfnyPSlBQCLJP-0vikV1XafiX6HTR9WSXjmHeYjmblsvQu6ZWgby_QZPD81h-m64MOUsswrdKCByZccMbClNVAqBDyOuKcBrUlNA7A2oUzIJRoFoyV3gQqPbyL1kLbXBN6iVrzxdxfoYR654Tk2JEQmDW5liILUgiMXQALb6N8M2Bl11XA42EU3wrUQA2UikCpGig1YwqAAnnA2qi77ffT1ME42OMp4rltHetY1wbwrlp7Vx3ybhs9gDf2rjHsvapow3G1hku8Itf_cacbdBwHUO9UEbeoVf0u_R3EG5W5r6fWH1nc0Gs |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Practical+Cube+Attack+against+Nonce-Misused+Ascon&rft.jtitle=IACR+Transactions+on+Symmetric+Cryptology&rft.au=Baudrin%2C+Jules&rft.au=Canteaut%2C+Anne&rft.au=Perrin%2C+L%C3%A9o&rft.date=2022-12-07&rft.issn=2519-173X&rft.eissn=2519-173X&rft.spage=120&rft.epage=144&rft_id=info:doi/10.46586%2Ftosc.v2022.i4.120-144&rft.externalDBID=n%2Fa&rft.externalDocID=10_46586_tosc_v2022_i4_120_144 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2519-173X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2519-173X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2519-173X&client=summon |