Publications

Here is a full list of my publications:

Bibliographical data is also available from DBLP and from my Google Scholar profile.

Conference papers

Time-memory Trade-offs for Near-collisions

Conference:

FSE 2013 (©IACR)

Authors:

Gaëtan Leurent

Keywords:

Hash function, near-collision, generic attacks, time-memory trade-off

Download:

paper, slides

Security Analysis of SIMD

Another Look at the Complementation Property

Conference:

FSE 2010 (© IACR)

Authors:

Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Gaëtan Leurent

Keywords:

Cryptanalysis, DES complementation property, Self-similarity, Hash function, SHA-3, Lesamnta, ESSENCE, Block cipher, XTEA, PURE

Abstract: In this paper we present a collection of attacks based on generalisations of the complementation property of DES. We find symmetry relations in the key schedule and in the actual rounds, and we use these symmetries to build distinguishers for any number of rounds when the relation is deterministic. This can be seen as a generalisation of the complementation property of DES or of slide/related-key attacks, using different kinds of relations. We further explore these properties, and show that if the relations have easily found fixed points, a new kind of attacks can be applied.
Our main result is a self-similarity property on the SHA-3 candidate Lesamnta, which gives a very surprising result on its compression function. Despite the use of round constants which were designed to thwart any such attack, we show a distinguisher on the full compression function which needs only one query, and works for any number of rounds. We also show how to use this self-similarity property to find collisions on the full compression function of Lesamnta much faster than generic attacks. The main reason for this is the structure found in these round constants, which introduce an interesting and unexpected symmetry relation. This casts some doubt on the use of highly structured constants, as it is the case in many designs, including the AES and several SHA-3 candidates. Our second main contribution is a new related-key differential attack on round-reduced versions of the XTEA block-cipher. We exploit the weakness of the key-schedule to suggest an iterative related-key differential. It can be used to recover the secret key faster than exhaustive search using two related keys on 37 rounds. We then isolate a big class of weak keys for which we can attack 51 rounds out of the cipher’s 64 rounds. We also apply our techniques to ESSENCE and PURE.
Hover to see the abstract.

Download:

paper, slides

How Risky is the Random Oracle Model?

Conference:

Crypto 2009 (©IACR)

Authors:

Gaëtan Leurent, Phong Nguyen

Keywords:

Random Oracle Model (ROM), instantiation, hash function

Download:

paper

Seminar talks

Differential Attacks against ARX Designs

Date:

December 6, 2012

Keywords:

Symmetric ciphers, hash functions, ARX, Skein, generalized characteristics, differential attacks

Abstract: In this talk, we study differential attacks against ARX schemes. We build upon the generalized characteristics of de Cannière and Rechberger; we introduce new multi-bit constraints to describe differential characteristics in ARX designs more accurately, and quartet constraints to analyze boomerang attacks. We describe an efficient way to propagate multi-bit constraints, that allows us to use the complete set of 2^32 2.5-bit constraints.
We have developed a set of tools for this analysis of ARX primitives based on this set of constraints. We show that the new constraints are more precise than what was used in previous works, and can detect several cases of incompatibility. In particular, we show that several published attacks are in fact fact invalid because the differential characteristics cannot be satisfied. This highlights the importance of verifying differential attacks more thoroughly.
Moreover, we are able to build automatically complex non-linear differential characteristics for reduced versions of the hash function Skein. We describe several characteristics for use in various attack scenarios; this results in attacks with a relatively low complexity, in relatively strong settings. In particular, we show practical free-start and semi-free-start collision attacks for 20 rounds and 12 rounds of Skein-256, respectively. To the best of our knowledge, these are the first examples of complex differential trails built for pure ARX designs.
Hover to see the abstract.

Download:

slides

Master's Thesis

Étude et automatisation de l'attaque de Wang sur MD4

Language:

French

Keywords:

Cryptanalysis, MD4, MD5, Wang's attack

Download:

thesis