Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks

The Gimli permutation proposed in CHES 2017 was designed for cross-platform performance. One main strategy to achieve such a goal is to utilize a sparse linear layer (Small-Swap and Big-Swap), which occurs every two rounds. In addition, the round constant addition occurs every four rounds and only...

Full description

Bibliographic Details
Main Authors: Fukang Liu, Takanori Isobe, Willi Meier
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2021-03-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/8837
id doaj-05c213f5d7d04cf4bee8e1a447665625
record_format Article
spelling doaj-05c213f5d7d04cf4bee8e1a4476656252021-03-20T13:57:49ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2021-03-012021110.46586/tosc.v2021.i1.185-216Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage AttacksFukang Liu0Takanori Isobe1Willi Meier2Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China; University of Hyogo, Hyogo, JapanUniversity of Hyogo, Hyogo, Japan; National Institute of Information and Communications Technology, Tokyo, Japan; PRESTO, Japan Science and Technology Agency, Tokyo, JapanUniversity of Applied Sciences and Arts Northwestern Switzerland, Windisch, Switzerland The Gimli permutation proposed in CHES 2017 was designed for cross-platform performance. One main strategy to achieve such a goal is to utilize a sparse linear layer (Small-Swap and Big-Swap), which occurs every two rounds. In addition, the round constant addition occurs every four rounds and only one 32-bit word is affected by it. The above two facts have been recently exploited to construct a distinguisher for the full Gimli permutation with time complexity 264. By utilizing a new property of the SP-box, we demonstrate that the time complexity of the full-round distinguisher can be further reduced to 252 while a significant bias still remains. Moreover, for the 18-round Gimli permutation, we could construct a distinguisher even with only 2 queries. Apart from the permutation itself, the weak diffusion can also be utilized to accelerate the preimage attacks on reduced Gimli-Hash and Gimli-XOF-128 with a divide-and-conquer method. As a consequence, the preimage attacks on reduced Gimli-Hash and Gimli-XOF-128 can reach up to 5 rounds and 9 rounds, respectively. Since Gimli is included in the second round candidates in NIST’s Lightweight Cryptography Standardization process, we expect that our analysis can further advance the understanding of Gimli. To the best of our knowledge, the distinguishing attacks and preimage attacks are the best so far. https://tosc.iacr.org/index.php/ToSC/article/view/8837hash functionGimliGimli-HashGimli-XOFpreimage attackdistinguisher
collection DOAJ
language English
format Article
sources DOAJ
author Fukang Liu
Takanori Isobe
Willi Meier
spellingShingle Fukang Liu
Takanori Isobe
Willi Meier
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
IACR Transactions on Symmetric Cryptology
hash function
Gimli
Gimli-Hash
Gimli-XOF
preimage attack
distinguisher
author_facet Fukang Liu
Takanori Isobe
Willi Meier
author_sort Fukang Liu
title Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
title_short Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
title_full Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
title_fullStr Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
title_full_unstemmed Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
title_sort exploiting weak diffusion of gimli: improved distinguishers and preimage attacks
publisher Ruhr-Universität Bochum
series IACR Transactions on Symmetric Cryptology
issn 2519-173X
publishDate 2021-03-01
description The Gimli permutation proposed in CHES 2017 was designed for cross-platform performance. One main strategy to achieve such a goal is to utilize a sparse linear layer (Small-Swap and Big-Swap), which occurs every two rounds. In addition, the round constant addition occurs every four rounds and only one 32-bit word is affected by it. The above two facts have been recently exploited to construct a distinguisher for the full Gimli permutation with time complexity 264. By utilizing a new property of the SP-box, we demonstrate that the time complexity of the full-round distinguisher can be further reduced to 252 while a significant bias still remains. Moreover, for the 18-round Gimli permutation, we could construct a distinguisher even with only 2 queries. Apart from the permutation itself, the weak diffusion can also be utilized to accelerate the preimage attacks on reduced Gimli-Hash and Gimli-XOF-128 with a divide-and-conquer method. As a consequence, the preimage attacks on reduced Gimli-Hash and Gimli-XOF-128 can reach up to 5 rounds and 9 rounds, respectively. Since Gimli is included in the second round candidates in NIST’s Lightweight Cryptography Standardization process, we expect that our analysis can further advance the understanding of Gimli. To the best of our knowledge, the distinguishing attacks and preimage attacks are the best so far.
topic hash function
Gimli
Gimli-Hash
Gimli-XOF
preimage attack
distinguisher
url https://tosc.iacr.org/index.php/ToSC/article/view/8837
work_keys_str_mv AT fukangliu exploitingweakdiffusionofgimliimproveddistinguishersandpreimageattacks
AT takanoriisobe exploitingweakdiffusionofgimliimproveddistinguishersandpreimageattacks
AT willimeier exploitingweakdiffusionofgimliimproveddistinguishersandpreimageattacks
_version_ 1724211393004044288