Skip to main content

Algebraic Attacks

Interpolation attack

The interpolation attack (Jakobsen and Knudsen, 1997) exploits the fact that the cipher (or permutation) can be expressed as a polynomial of low degree over Fp\mathbb{F}_p.

If the permutation π:FpFp\pi: \mathbb{F}_p \to \mathbb{F}_p after rr rounds can be represented as a polynomial of degree dd, then d+1d + 1 input-output pairs suffice to recover the polynomial via Lagrange interpolation. The attack is feasible when d<pd < p.

Complexity

For an S-box S(x)=xαS(x) = x^{\alpha} with tt-element state and rr full rounds, the degree of the output polynomial in the input is at most αr\alpha^r (before reduction modulo field equations).

The attack applies when:

αr<p\alpha^r < p

This gives the minimum number of rounds for security against interpolation:

rmin>logplogαr_{\min} > \frac{\log p}{\log \alpha}

Partial round optimization

Poseidon uses a mix of full rounds (S-box on every element) and partial rounds (S-box on one element). The degree growth in partial rounds is slower: only one coordinate has its degree multiplied by α\alpha per round.

Invariant subspace attack

An invariant subspace VFptV \subseteq \mathbb{F}_p^t is a subspace (or coset) that is mapped to itself (or another coset) by every round of the permutation. If such a subspace exists, inputs from VV produce outputs in a predictable subset, breaking the random permutation assumption.

AO hash functions must be designed so that the combination of S-box and MDS matrix does not admit invariant subspaces. The round constants play a role in breaking potential invariant structures.

References