Show simple item record

dc.contributor.authorGrassi, Lorenzo
dc.contributor.authorKhovratovich, Dmitry
dc.contributor.authorRønjom, Sondre
dc.contributor.authorSchofnegger, Markus
dc.date.accessioned2023-03-20T13:04:55Z
dc.date.available2023-03-20T13:04:55Z
dc.date.created2022-10-19T10:28:24Z
dc.date.issued2022
dc.identifier.issn2519-173X
dc.identifier.urihttps://hdl.handle.net/11250/3059277
dc.description.abstractMotivated by modern cryptographic use cases such as multi-party computation (MPC), homomorphic encryption (HE), and zero-knowledge (ZK) protocols, several symmetric schemes that are efficient in these scenarios have recently been proposed in the literature. Some of these schemes are instantiated with low-degree nonlinear functions, for example low-degree power maps (e.g., MiMC, HadesMiMC, Poseidon) or the Toffoli gate (e.g., Ciminion). Others (e.g., Rescue, Vision, Grendel) are instead instantiated via high-degree functions which are easy to evaluate in the target application. A recent example for the latter case is the hash function Grendel, whose nonlinear layer is constructed using the Legendre symbol. In this paper, we analyze high-degree functions such as the Legendre symbol or the modulo-2 operation as building blocks for the nonlinear layer of a cryptographic scheme over Fnp.Our focus regards the security analysis rather than the efficiency in the mentioned use cases. For this purpose, we present several new invertible functions that make use of the Legendre symbol or of the modulo-2 operation. Even though these functions often provide strong statistical properties and ensure a high degree after a few rounds, the main problem regards their small number of possible outputs, that is, only three for the Legendre symbol and only two for the modulo-2 operation. By fixing them, it is possible to reduce the overall degree of the function significantly. We exploit this behavior by describing the first preimage attack on full Grendel, and we verify it in practice.en_US
dc.language.isoengen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleThe Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp: Preimage Attack on Full Grendelen_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.description.versionpublishedVersionen_US
dc.rights.holderCopyright 2022 The Author(s)en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1
dc.identifier.doi10.46586/TOSC.V2022.I1.5-37
dc.identifier.cristin2062644
dc.source.journalIACR Transactions on Symmetric Cryptology (ToSC)en_US
dc.source.pagenumber5-37en_US
dc.identifier.citationIACR Transactions on Symmetric Cryptology (ToSC). 2022, 2022 (1), 5-37.en_US
dc.source.volume2022en_US
dc.source.issue1en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Navngivelse 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Navngivelse 4.0 Internasjonal