Algebraic Attacks on Round-Reduced RAIN and Full AIM-III.

Kaiyi Zhang,Qingju Wang,Yu,Chun Guo,Hongrui Cui
DOI: https://doi.org/10.1007/978-981-99-8727-6_10
2023-01-01
Abstract:Picnic is a NIST PQC Round 3 Alternate signature candidate that builds upon symmetric primitives following the MPC-in-the-head paradigm. Recently, researchers have been exploring more secure/efficient signature schemes from conservative one-way functions based on AES, or new low-complexity one-way functions like RAIN (CCS 2022) and AIM (CCS 2023 and Round 1 Additional Signatures announced by NIST PQC). The signature schemes based on RAIN and AIM are currently the most efficient among MPC-in-the-head-based schemes, making them promising post-quantum digital signature candidates. However, the exact hardness of these new one-way functions deserves further study and scrutiny. This work presents algebraic attacks on RAIN and AIM for certain instances, where one-round RAIN can be compromised in 2(n/2) for security parameter n is an element of {128, 192, 256}, and two-round RAIN can be broken in 2(120.3), 2(180.4), and 2(243.1) encryptions, respectively. Additionally, we demonstrate an attack on AIM-III (which aims at 192-bit security) with a complexity of 2(186.5) encryptions. These attacks exploit the algebraic structure of the power function over fields with characteristic 2, which provides potential insights into the algebraic structures of some symmetric primitives and thus might be of independent interest.
What problem does this paper attempt to address?