International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails

Authors:
Lorenzo Grassi
Katharina Koschatko
Christian Rechberger
Download:
DOI: 10.46586/tosc.v2025.i2.34-86
URL: https://tosc.iacr.org/index.php/ToSC/article/view/12244
Search ePrint
Search Google
Abstract: At the current state of the art, algebraic attacks are the most efficient method for finding preimages and collisions for arithmetization-oriented hash functions, such as the closely related primitives Poseidon/Poseidon2 and Neptune. In this paper, we revisit Gröbner basis (GB) attacks that exploit subspace trails to linearize some partial rounds, considering both sponge and compression modes.Starting from Poseidon’s original security evaluation, we identified some inaccuracies in the model description that may lead to misestimated round requirements. Consequently, we reevaluate and improve the proposed attack strategy. We find that depending on the concrete instantiation, the original security analysis of Poseidon under- or overestimates the number of rounds needed for security. Moreover, we demonstrate that GB attacks leveraging subspace trails can outperform basic GB attacks for Poseidon/Poseidon2 and Neptune.We propose a variant of the previous attack strategy that exploits a crucial difference between Poseidon/Poseidon2 and Neptune: while Poseidon’s inverse round functions have a high degree, Neptune’s inverse external rounds maintain the same degree as the forward rounds. Using this new model, we demonstrate that Neptune’s security in compression mode cannot be reduced to its security against the Constrained-Input-Constrained-Output (CICO) problem. To the best of our knowledge, this is the first time a concrete example has been provided where finding preimages is easier than solving the corresponding CICO problem.Our results emphasize the importance of considering the mode of operation in security analysis while confirming the overall security of Poseidon/Poseidon2 and Neptune against the presented algebraic attacks.
BibTeX
@article{tosc-2025-35840,
  title={Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails},
  journal={IACR Transactions on Symmetric Cryptology},
  publisher={Ruhr-Universität Bochum},
  volume={2025},
  pages={34-86},
  url={https://tosc.iacr.org/index.php/ToSC/article/view/12244},
  doi={10.46586/tosc.v2025.i2.34-86},
  author={Lorenzo Grassi and Katharina Koschatko and Christian Rechberger},
  year=2025
}