Opening the blackbox: collision attacks on round-reduced Tip5, Tip4, Tip4' and monolith

A new design strategy for ZK-friendly hash functions has emerged since the proposal of Reinforced Concrete at CCS 2022, which is based on the hybrid use of two types of nonlinear transforms: the composition of some small-scale lookup tables (e.g., 7-bit or 8-bit permutations) and simple power maps o...

Full description

Bibliographic Details
Main Authors: Liu, Fukang, Koschatko, Katharina, Grassi, Lorenzo, Yan, Hailun, Chen, Shiyao, Banik, Subhadeep, Meier, Willi
Other Authors: School of Physical and Mathematical Sciences
Format: Journal Article
Language:English
Published: 2025
Subjects:
Online Access:https://hdl.handle.net/10356/182551
_version_ 1826115763243581440
author Liu, Fukang
Koschatko, Katharina
Grassi, Lorenzo
Yan, Hailun
Chen, Shiyao
Banik, Subhadeep
Meier, Willi
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Liu, Fukang
Koschatko, Katharina
Grassi, Lorenzo
Yan, Hailun
Chen, Shiyao
Banik, Subhadeep
Meier, Willi
author_sort Liu, Fukang
collection NTU
description A new design strategy for ZK-friendly hash functions has emerged since the proposal of Reinforced Concrete at CCS 2022, which is based on the hybrid use of two types of nonlinear transforms: the composition of some small-scale lookup tables (e.g., 7-bit or 8-bit permutations) and simple power maps over Fp. Following such a design strategy, some new ZK-friendly hash functions have been recently proposed, e.g., Tip5, Tip4, Tip4’, and the Monolith family. All these hash functions have a small number of rounds, i.e., 5 rounds for Tip5, Tip4, and Tip4’, and 6 rounds for Monolith (recently published at ToSC 2024/3). Using the composition of some small-scale lookup tables to build a large-scale permutation over Fp – which we call S-box – is a main feature in such designs, which can somehow enhance the resistance against the Gröbner basis attack because this large-scale permutation will correspond to a complex and high-degree polynomial representation over Fp. As the first technical contribution, we propose a novel and efficient algorithm to study the differential property of this S-box and to find a conforming input pair for a randomly given input and output difference. For comparison, a trivial method based on the use of the differential distribution table (DDT) for solving this problem will require time complexity O(p2). For the second contribution, we also propose new frameworks to devise efficient collision attacks on such hash functions. Based on the differential properties of these S-boxes and the new attack frameworks, we propose the first collision attacks on 3-round Tip5, Tip4, and Tip4’, as well as 2-round Monolith-31 and Monolith-64, where the 2-round attacks on Monolith are practical. In the semi-free-start (SFS) collision attack setting, we achieve practical SFS collision attacks on 3-round Tip5, Tip4, and Tip4’. Moreover, the SFS collision attacks can reach up to 4-round Tip4 and 3-round Monolith-64. As far as we know, this is the first third-party cryptanalysis of these hash functions, which improves the initial analysis given by the designers.
first_indexed 2025-03-09T11:28:22Z
format Journal Article
id ntu-10356/182551
institution Nanyang Technological University
language English
last_indexed 2025-03-09T11:28:22Z
publishDate 2025
record_format dspace
spelling ntu-10356/1825512025-02-10T15:36:13Z Opening the blackbox: collision attacks on round-reduced Tip5, Tip4, Tip4' and monolith Liu, Fukang Koschatko, Katharina Grassi, Lorenzo Yan, Hailun Chen, Shiyao Banik, Subhadeep Meier, Willi School of Physical and Mathematical Sciences Digital Trust Centre Computer and Information Science Mathematical Sciences Tip5/Tip4/Tip4 Monolith A new design strategy for ZK-friendly hash functions has emerged since the proposal of Reinforced Concrete at CCS 2022, which is based on the hybrid use of two types of nonlinear transforms: the composition of some small-scale lookup tables (e.g., 7-bit or 8-bit permutations) and simple power maps over Fp. Following such a design strategy, some new ZK-friendly hash functions have been recently proposed, e.g., Tip5, Tip4, Tip4’, and the Monolith family. All these hash functions have a small number of rounds, i.e., 5 rounds for Tip5, Tip4, and Tip4’, and 6 rounds for Monolith (recently published at ToSC 2024/3). Using the composition of some small-scale lookup tables to build a large-scale permutation over Fp – which we call S-box – is a main feature in such designs, which can somehow enhance the resistance against the Gröbner basis attack because this large-scale permutation will correspond to a complex and high-degree polynomial representation over Fp. As the first technical contribution, we propose a novel and efficient algorithm to study the differential property of this S-box and to find a conforming input pair for a randomly given input and output difference. For comparison, a trivial method based on the use of the differential distribution table (DDT) for solving this problem will require time complexity O(p2). For the second contribution, we also propose new frameworks to devise efficient collision attacks on such hash functions. Based on the differential properties of these S-boxes and the new attack frameworks, we propose the first collision attacks on 3-round Tip5, Tip4, and Tip4’, as well as 2-round Monolith-31 and Monolith-64, where the 2-round attacks on Monolith are practical. In the semi-free-start (SFS) collision attack setting, we achieve practical SFS collision attacks on 3-round Tip5, Tip4, and Tip4’. Moreover, the SFS collision attacks can reach up to 4-round Tip4 and 3-round Monolith-64. As far as we know, this is the first third-party cryptanalysis of these hash functions, which improves the initial analysis given by the designers. Info-communications Media Development Authority (IMDA) National Research Foundation (NRF) Published version Fukang Liu has been supported by JSPS KAKENHI Grant Numbers JP22K21282,JP24K20733, as well as the commissioned research (No. JPJ012368C05801) by NationalInstitute of Information and Communications Technology (NICT). Lorenzo Grassi hasbeen supported by the Ethereum Foundation via the Academic Grant Program 2024,and by the German Research foundation (DFG) within the framework of the ExcellenceStrategy of the Federal Government and the States – EXC 2092 CaSa. Hailun Yanhas been supported by the National Key Research and Development Program of China(2022YFB2701900) and the National Natural Science Foundation of China (62202444).This research is supported by the National Research Foundation, Singapore and InfocommMedia Development Authority under its Trust Tech Funding Initiative. 2025-02-10T06:01:27Z 2025-02-10T06:01:27Z 2024 Journal Article Liu, F., Koschatko, K., Grassi, L., Yan, H., Chen, S., Banik, S. & Meier, W. (2024). Opening the blackbox: collision attacks on round-reduced Tip5, Tip4, Tip4' and monolith. IACR Transactions On Symmetric Cryptology, 2024(4), 97-137. https://dx.doi.org/10.46586/tosc.v2024.i4.97-137 2519-173X https://hdl.handle.net/10356/182551 10.46586/tosc.v2024.i4.97-137 4 2024 97 137 en IACR Transactions on Symmetric Cryptology © 2024 Fukang Liu, Katharina Koschatko, Lorenzo Grassi, Hailun Yan, Shiyao Chen, Subhadeep Banik, Willi Meier. This work is licensed under a Creative Commons Attribution 4.0 International License. application/pdf
spellingShingle Computer and Information Science
Mathematical Sciences
Tip5/Tip4/Tip4
Monolith
Liu, Fukang
Koschatko, Katharina
Grassi, Lorenzo
Yan, Hailun
Chen, Shiyao
Banik, Subhadeep
Meier, Willi
Opening the blackbox: collision attacks on round-reduced Tip5, Tip4, Tip4' and monolith
title Opening the blackbox: collision attacks on round-reduced Tip5, Tip4, Tip4' and monolith
title_full Opening the blackbox: collision attacks on round-reduced Tip5, Tip4, Tip4' and monolith
title_fullStr Opening the blackbox: collision attacks on round-reduced Tip5, Tip4, Tip4' and monolith
title_full_unstemmed Opening the blackbox: collision attacks on round-reduced Tip5, Tip4, Tip4' and monolith
title_short Opening the blackbox: collision attacks on round-reduced Tip5, Tip4, Tip4' and monolith
title_sort opening the blackbox collision attacks on round reduced tip5 tip4 tip4 and monolith
topic Computer and Information Science
Mathematical Sciences
Tip5/Tip4/Tip4
Monolith
url https://hdl.handle.net/10356/182551
work_keys_str_mv AT liufukang openingtheblackboxcollisionattacksonroundreducedtip5tip4tip4andmonolith
AT koschatkokatharina openingtheblackboxcollisionattacksonroundreducedtip5tip4tip4andmonolith
AT grassilorenzo openingtheblackboxcollisionattacksonroundreducedtip5tip4tip4andmonolith
AT yanhailun openingtheblackboxcollisionattacksonroundreducedtip5tip4tip4andmonolith
AT chenshiyao openingtheblackboxcollisionattacksonroundreducedtip5tip4tip4andmonolith
AT baniksubhadeep openingtheblackboxcollisionattacksonroundreducedtip5tip4tip4andmonolith
AT meierwilli openingtheblackboxcollisionattacksonroundreducedtip5tip4tip4andmonolith