CryptoDB
Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation
| Authors: | 
 | 
|---|---|
| Download: | |
| Abstract: | We consider highly structured truncated differential paths to mount a new rebound attack on Grøstl-512, a hash functions based on two AES-like permutations, P1024 and Q1024, with non-square input and output registers. We explain how such differential paths can be computed using a Mixed-Integer Linear Programming approach. Together with a SuperSBox description, this allows us to build a rebound attack with a 6-round inbound phase whereas classical rebound attacks have 4-round inbound phases. This yields the first distinguishing attack on a 11-round version of P1024 and Q1024 with about 272 computations and a memory complexity of about 256 bytes, to be compared with the 296 computations required by the corresponding generic attack. Previous best results on this permutation reached 10 rounds with a computational complexity of about 2392 operations, to be compared with the 2448 computations required by the corresponding generic attack. | 
BibTeX
@article{tosc-2017-28489,
  title={Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation},
  journal={IACR Trans. Symmetric Cryptol.},
  publisher={Ruhr-Universität Bochum},
  volume={2017, Issue 3},
  pages={1-23},
  url={https://tosc.iacr.org/index.php/ToSC/article/view/763},
  doi={10.13154/tosc.v2017.i3.1-23},
  author={Victor Cauchois and Clément Gomez and Reynald Lercier},
  year=2017
}
