Attacks only get better: How to break FF3 on large domains

Viet Tung Hoang, David Miller, Ni Trieu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We improve the attack of Durak and Vaudenay (CRYPTO’17) on NIST Format-Preserving Encryption standard FF3, reducing the running time from O(N5) to O(N17 / 6) for domain ZN× ZN. Concretely, DV’s attack needs about 2 50 operations to recover encrypted 6-digit PINs, whereas ours only spends about 2 30 operations. In realizing this goal, we provide a pedagogical example of how to use distinguishing attacks to speed up slide attacks. In addition, we improve the running time of DV’s known-plaintext attack on 4-round Feistel of domain ZN× ZN from O(N3) time to just O(N5 / 3) time. We also generalize our attacks to a general domain ZM× ZN, allowing one to recover encrypted SSNs using about 2 50 operations. Finally, we provide some proof-of-concept implementations to empirically validate our results.

Original languageEnglish (US)
Title of host publicationAdvances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
EditorsVincent Rijmen, Yuval Ishai
PublisherSpringer Verlag
Pages85-116
Number of pages32
ISBN (Print)9783030176556
DOIs
StatePublished - 2019
Externally publishedYes
Event38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2019 - Darmstadt, Germany
Duration: May 19 2019May 23 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11477 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2019
CountryGermany
CityDarmstadt
Period5/19/195/23/19

Keywords

  • Attacks
  • Format-Preserving Encryption

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Attacks only get better: How to break FF3 on large domains'. Together they form a unique fingerprint.

Cite this