Processing math: 100%

International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

David Miller

Publications

Year
Venue
Title
2019
EUROCRYPT
Attacks only Get Better: How to Break FF3 on Large Domains 📺
Viet Tung Hoang David Miller Ni Trieu
We improve the attack of Durak and Vaudenay (CRYPTO’17) on NIST Format-Preserving Encryption standard FF3, reducing the running time from O(N5)O(N5) to O(N17/6)O(N17/6) for domain ZN×ZNZN×ZN. Concretely, DV’s attack needs about 250250 operations to recover encrypted 6-digit PINs, whereas ours only spends about 230230 operations. In realizing this goal, we provide a pedagogical example of how to use distinguishing attacks to speed up slide attacks. In addition, we improve the running time of DV’s known-plaintext attack on 4-round Feistel of domain ZN×ZNZN×ZN from O(N3)O(N3) time to just O(N5/3)O(N5/3) time. We also generalize our attacks to a general domain ZM×ZNZM×ZN, allowing one to recover encrypted SSNs using about 250250 operations. Finally, we provide some proof-of-concept implementations to empirically validate our results.

Coauthors

Viet Tung Hoang (1)
David Miller (1)
Ni Trieu (1)