Skip to main content

Statistical Attacks

Linear cryptanalysis

Linear cryptanalysis finds approximate linear relations between input and output bits (or field elements). For a function f:FptFptf: \mathbb{F}_p^t \to \mathbb{F}_p^t, a linear approximation is:

iaixijbjf(x)j\sum_{i} a_i \cdot x_i \approx \sum_{j} b_j \cdot f(x)_j

with some bias ε\varepsilon from uniform. The attack requires O(1/ε2)O(1/\varepsilon^2) known input-output pairs.

For power map S-boxes xαx^{\alpha} over large Fp\mathbb{F}_p, the linear bias is O(1/p)O(1/\sqrt{p}) by the Weil bound. This makes pure linear cryptanalysis infeasible for large primes.

Integral / square attack

The integral attack exploits the algebraic structure directly. Choose a set of inputs where some coordinates vary over all values in a subfield or subspace, while others are fixed. If the sum (integral) over the output set is predictable (e.g., zero), this gives a distinguisher.

For AO hash functions, the integral property is closely related to algebraic degree: a function of degree dd satisfies

xVf(x)=0\sum_{x \in V} f(x) = 0

for any subspace VV of dimension >d> d (over F2\mathbb{F}_2, this is exact; over Fp\mathbb{F}_p the relationship is more nuanced).

Boomerang and rectangle attacks

These are differential-based techniques that combine two short differential trails into a longer distinguisher. Their relevance to AO hash functions is limited compared to algebraic attacks, but they have been studied for completeness in security analyses of Rescue and Anemoi.

References