Bounds for the Security of Ascon against Differential and Linear Cryptanalysis

The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices. One essential criterion for the evaluation of the 10 finalists is the evidence for their security against attacks like line...

Full description

Saved in:
Bibliographic Details
Published inIACR Transactions on Symmetric Cryptology Vol. 2022; no. 1; pp. 64 - 87
Main Authors Erlacher, Johannes, Mendel, Florian, Eichlseder, Maria
Format Journal Article
LanguageEnglish
Published Ruhr-Universität Bochum 11.03.2022
Online AccessGet full text

Cover

Loading…
Abstract The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices. One essential criterion for the evaluation of the 10 finalists is the evidence for their security against attacks like linear and differential cryptanalysis. For Ascon, one of the finalists and previous winner of the CAESAR competition in the ‘lightweight’ category, there is a large gap between the proven bounds and the best known characteristics found with heuristic tools: The bounds only cover up to 3 rounds with 15 differentially and 13 linearly active S-boxes, insufficient for proving a level of security for the full constructions.In this paper, we propose a new modeling strategy for SAT solvers and derive strong bounds for the round-reduced Ascon permutation. We prove that 4 rounds already ensure that any single characteristic has a differential probability or squared correlation of at most 2−72, and 6 rounds at most 2−108. This is significantly below the bound that could be exploited within the query limit for keyed Ascon modes. These bounds are probably not tight. To achieve this result, we propose a new search strategy of dividing the search space into a large number of subproblems based on ‘girdle patterns’, and show how to exploit the rotational symmetry of Ascon using necklace theory. Additionally, we evaluate and optimize several aspects of the pure SAT model, including the counter implementation and parallelizability, which we expect to be useful for future applications to other models.
AbstractList The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices. One essential criterion for the evaluation of the 10 finalists is the evidence for their security against attacks like linear and differential cryptanalysis. For Ascon, one of the finalists and previous winner of the CAESAR competition in the ‘lightweight’ category, there is a large gap between the proven bounds and the best known characteristics found with heuristic tools: The bounds only cover up to 3 rounds with 15 differentially and 13 linearly active S-boxes, insufficient for proving a level of security for the full constructions.In this paper, we propose a new modeling strategy for SAT solvers and derive strong bounds for the round-reduced Ascon permutation. We prove that 4 rounds already ensure that any single characteristic has a differential probability or squared correlation of at most 2−72, and 6 rounds at most 2−108. This is significantly below the bound that could be exploited within the query limit for keyed Ascon modes. These bounds are probably not tight. To achieve this result, we propose a new search strategy of dividing the search space into a large number of subproblems based on ‘girdle patterns’, and show how to exploit the rotational symmetry of Ascon using necklace theory. Additionally, we evaluate and optimize several aspects of the pure SAT model, including the counter implementation and parallelizability, which we expect to be useful for future applications to other models.
Author Mendel, Florian
Eichlseder, Maria
Erlacher, Johannes
Author_xml – sequence: 1
  givenname: Johannes
  surname: Erlacher
  fullname: Erlacher, Johannes
– sequence: 2
  givenname: Florian
  surname: Mendel
  fullname: Mendel, Florian
– sequence: 3
  givenname: Maria
  surname: Eichlseder
  fullname: Eichlseder, Maria
BookMark eNp9kMFqGzEQQEVJoUnqP-hBP7COVpI1Um-uk7QGkxzaQm9iViu5ClvJSErAf9_ETiDkkNMMA-8xvDNyknLyhHzp2VyqhVYXLVc3f-CM83ns50p2Gj6QU77oTdeD-HPyav9EZrXeMca4NkJJc0puvuX7NFYacqHtr6c_vbsvse1pDnRZXU4UtxhTbfQyhuCLTy3iRDGNdBOTx0JXZb9rmHDa11g_k48Bp-pnz_Oc_L6--rX60W1uv69Xy03nJDetc4hoNDitQhBo_KADG4dBBCEEAykBQEuuJdPYB-GlYc74wLzi4JSAQZyT9dE7ZryzuxL_YdnbjNEeDrlsLZYW3eQtIALXymNgRopRagYqACycH2GAwT26vh5druRaiw_WxYYt5tQKxsn2zB5C26fQ9hDaxt4qaTU8wvIN_PLMu9h_KVGHVQ
CitedBy_id crossref_primary_10_1049_2024_6624991
crossref_primary_10_1587_transfun_2023EAP1098
crossref_primary_10_1109_JIOT_2024_3420908
crossref_primary_10_1587_transfun_2023EAP1149
crossref_primary_10_1109_TIT_2024_3473940
crossref_primary_10_1007_s10623_023_01259_9
crossref_primary_10_1088_1402_4896_ad9867
crossref_primary_10_1007_s11128_024_04472_0
crossref_primary_10_1007_s10623_024_01383_0
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.46586/tosc.v2022.i1.64-87
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EISSN 2519-173X
EndPage 87
ExternalDocumentID oai_doaj_org_article_7aa7286eaf0943d48076f775ced7b7bc
10_46586_tosc_v2022_i1_64_87
GroupedDBID AAYXX
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
CITATION
GROUPED_DOAJ
ID FETCH-LOGICAL-c429t-caaa987c86ff3a9eb8f0dbb3f33307447778428408a1f3e490c9ef0e627c637b3
IEDL.DBID DOA
ISSN 2519-173X
IngestDate Wed Aug 27 01:00:51 EDT 2025
Tue Jul 01 03:41:35 EDT 2025
Thu Apr 24 23:10:26 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c429t-caaa987c86ff3a9eb8f0dbb3f33307447778428408a1f3e490c9ef0e627c637b3
OpenAccessLink https://doaj.org/article/7aa7286eaf0943d48076f775ced7b7bc
PageCount 24
ParticipantIDs doaj_primary_oai_doaj_org_article_7aa7286eaf0943d48076f775ced7b7bc
crossref_citationtrail_10_46586_tosc_v2022_i1_64_87
crossref_primary_10_46586_tosc_v2022_i1_64_87
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-03-11
PublicationDateYYYYMMDD 2022-03-11
PublicationDate_xml – month: 03
  year: 2022
  text: 2022-03-11
  day: 11
PublicationDecade 2020
PublicationTitle IACR Transactions on Symmetric Cryptology
PublicationYear 2022
Publisher Ruhr-Universität Bochum
Publisher_xml – name: Ruhr-Universität Bochum
SSID ssj0002893649
Score 2.3063524
Snippet The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for...
SourceID doaj
crossref
SourceType Open Website
Enrichment Source
Index Database
StartPage 64
Title Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
URI https://doaj.org/article/7aa7286eaf0943d48076f775ced7b7bc
Volume 2022
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxYEAkT5kgdWlyR2bGdsC1WFRBeo1M2yHRsVVWnVFCT-Pec4VNm6sFqObd35fPeUu3sIPUjwSvDqp8RkuSRMW7A5JnKiJefMG8p4Uz72OuPTOXtZ5IsO1VfICYvtgaPgHoXWIpPcaR9y4MpQAc29ELl1pTDC2PD6gs_rgKnP-PuMclbEWjnYL7AJrWs7-Aasnw2W6YAzErLoOr6o07K_8S2TU3TSBoV4GA9zho5cdY5mo8B4VGOIKjFEafitZZrDa4-HNcBYrD8A1tc7_NSSnICxrrCuSgwAEy4wHm9_NhD7xa4jF2g-eX4fT0nLfkAs-IgdsVrrQgorufdUF85In5TGUE8p2CVjQggJ2IElUqeeOlYktnA-cTwTllNh6CXqVevKXSHMmYF1kkg1DA7eOJZlOoxlVPPE9xH9k4OybWvwwFCxUgARGumpID3VSE8tU8WZkqKPyP6rTWyNcWD-KIh4Pzc0tm4GQN2qVbc6pO7r_1jkBh2Hk4VUsjS9Rb3d9svdQWyxM_fNNfoFAwnMDw
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Bounds+for+the+Security+of+Ascon+against+Differential+and+Linear+Cryptanalysis&rft.jtitle=IACR+Transactions+on+Symmetric+Cryptology&rft.au=Johannes+Erlacher&rft.au=Florian+Mendel&rft.au=Maria+Eichlseder&rft.date=2022-03-11&rft.pub=Ruhr-Universit%C3%A4t+Bochum&rft.eissn=2519-173X&rft.volume=2022&rft.issue=1&rft_id=info:doi/10.46586%2Ftosc.v2022.i1.64-87&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_7aa7286eaf0943d48076f775ced7b7bc
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2519-173X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2519-173X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2519-173X&client=summon