International Association for Cryptologic Research

International Association
for Cryptologic Research


New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting

Fukang Liu , University of Hyogo, Hyogo, Japan
Willi Meier , University of Applied Sciences and Arts Northwestern Switzerland (FHNW), Windisch, Switzerland
Santanu Sarkar , Indian Institute of Technology Madras, Chennai, India
Takanori Isobe , University of Hyogo, Hyogo, Japan; National Institute of Information and Communications Technology (NICT), Tokyo, Japan; PRESTO, Japan Science and Technology Agency, Tokyo, Japan
DOI: 10.46586/tosc.v2022.i3.102-122
Search ePrint
Search Google
Abstract: The security of the post-quantum signature scheme Picnic is highly related to the difficulty of recovering the secret key of LowMC from a single plaintext-ciphertext pair. Since Picnic is one of the alternate third-round candidates in NIST post-quantum cryptography standardization process, it has become urgent and important to evaluate the security of LowMC in the Picnic setting. The best attacks on LowMC with full S-box layers used in Picnic3 were achieved with Dinur’s algorithm. For LowMC with partial nonlinear layers, e.g. 10 S-boxes per round adopted in Picnic2, the best attacks on LowMC were published by Banik et al. with the meet-in-the-middle (MITM) method.In this paper, we improve the attacks on LowMC in a model where memory consumption is costly. First, a new attack on 3-round LowMC with full S-box layers with negligible memory complexity is found, which can outperform Bouillaguet et al.’s fast exhaustive search attack and can achieve better time-memory tradeoffs than Dinur’s algorithm. Second, we extend the 3-round attack to 4 rounds to significantly reduce the memory complexity of Dinur’s algorithm at the sacrifice of a small factor of time complexity. For LowMC instances with 1 S-box per round, our attacks are shown to be much faster than the MITM attacks. For LowMC instances with 10 S-boxes per round, we can reduce the memory complexity from 32GB (238 bits) to only 256KB (221 bits) using our new algebraic attacks rather than the MITM attacks, while the time complexity of our attacks is about 23.2 ∼ 25 times higher than that of the MITM attacks. A notable feature of our new attacks (apart from the 4-round attack) is their simplicity. Specifically, only some basic linear algebra is required to understand them and they can be easily implemented.
  title={New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting},
  journal={IACR Transactions on Symmetric Cryptology},
  publisher={Ruhr-Universität Bochum},
  volume={2022, Issue 3},
  author={Fukang Liu and Willi Meier and Santanu Sarkar and Takanori Isobe},