International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Paper: Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

Authors:
Martin R. Albrecht
Carlos Cid
Lorenzo Grassi
Dmitry Khovratovich
Reinhard Lüftenegger
Christian Rechberger
Markus Schofnegger
Download:
DOI: 10.1007/978-3-030-34618-8_13
Search ePrint
Search Google
Abstract: The block cipher Jarvis and the hash function Friday, both members of the MARVELlous family of cryptographic primitives, are among the first proposed solutions to the problem of designing symmetric-key algorithms suitable for transparent, post-quantum secure zero-knowledge proof systems such as ZK-STARKs. In this paper we describe an algebraic cryptanalysis of Jarvis and Friday and show that the proposed number of rounds is not sufficient to provide adequate security. In Jarvis, the round function is obtained by combining a finite field inversion, a full-degree affine permutation polynomial and a key addition. Yet we show that even though the high degree of the affine polynomial may prevent some algebraic attacks (as claimed by the designers), the particular algebraic properties of the round function make both Jarvis and Friday vulnerable to Gröbner basis attacks. We also consider MiMC, a block cipher similar in structure to Jarvis. However, this cipher proves to be resistant against our proposed attack strategy. Still, our successful cryptanalysis of Jarvis and Friday does illustrate that block cipher designs for “algebraic platforms” such as STARKs, FHE or MPC may be particularly vulnerable to algebraic attacks.
BibTeX
@article{asiacrypt-2019-30067,
  title={Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC},
  booktitle={Advances in Cryptology – ASIACRYPT 2019},
  series={Advances in Cryptology – ASIACRYPT 2019},
  publisher={Springer},
  volume={11923},
  pages={371-397},
  doi={10.1007/978-3-030-34618-8_13},
  author={Martin R. Albrecht and Carlos Cid and Lorenzo Grassi and Dmitry Khovratovich and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger},
  year=2019
}