Advances in Cryptology – ASIACRYPT 2025
Vectorial Fast Correlation Attacks
Bin Zhang
University of Chinese Academy of Sciences, China; State Key Laboratory of Cryptology, China; Trusted Computing and Information Assurance Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China; Guizhou shujubao Network Technology Co., Ltd., China; Hefei National Laboratory, China
Ruitao Liu
University of Chinese Academy of Sciences, China; Trusted Computing and Information Assurance Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China; Zhongguancun Laboratory, China
Willi Meier
University of Applied Sciences and Arts Northwestern Switzerland, Switzerland
Siwei Sun
University of Chinese Academy of Sciences, China;
Dengguo Feng
University of Chinese Academy of Sciences, China; State Key Laboratory of Cryptology, China; Trusted Computing and Information Assurance Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China; Zhongguancun Laboratory, China
Wenling Wu
University of Chinese Academy of Sciences, China; Trusted Computing and Information Assurance Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China; Zhongguancun Laboratory, China
Keywords:
Abstract
In this paper, we develop a new framework for vectorial fast correlation attacks, which exploits the vector-wise correlation in a novel and different approach from the previous Golić's attack and gives the complete theoretical predictions of the attack complexities. First, the concept of correlation profile is introduced to characterize both the correlation of some linear approximation and the number of approximations having this correlation, which is not captured by the current notion of capacity or the Squared Euclidean Imbalance (SEI). It is shown how to construct the attack vector by carefully selecting the component-wise linear approximations to make a maximal usage of the inherent correlations. Second, we show how to transform and deliver the secret key information in the constructed vector by sequentially deriving linear subspaces from the original vector when the correlation profile is favorable. We further devise an efficient decoding algorithm to restore the partial secret key information retained in the last linear subspace, which allows for the recovery of the full secret information subsequently. Last, we present improved state recovery attacks on the ISO/IEC 29167-13 standard Grain-128a, the eSTREAM finalists Grain v1 and Sosemanuk, respectively by the new method. We resolve the open problem of detecting the output masks for Grain-like ciphers other than MILP at Crypto 2018 and propose a new algorithm based on graph theory to dissect complicated Boolean functions with many variables and compute its distribution efficiently. For Grain-128a, given around 2106.3 bits of keystream, the time complexity is 2107.7, while for Grain v1, given 267.0 bits of keystream, the attack has a time complexity of 269.6. These attacks are around 212 times better than the best published results at Crypto 2018. For Sosemanuk, we propose a flexible assign-and-solve strategy to mount the first attack faster than exhaustive search of the 128-bit secret key.
Publication
Advances in Cryptology – ASIACRYPT 2025. ASIACRYPT 2025. Lecture Notes in Computer Science, vol 16245. Springer, Singapore.
PaperArtifact
Artifact number
asiacrypt/2025/a17
Artifact published
December 31, 2025
Badge
IACR Artifacts Functional
License
This work is licensed under the MIT License.
Note that license information is supplied by the authors and has not been confirmed by the IACR.
BibTeX How to cite
Zhang, B., Liu, R., Meier, W., Sun, S., Feng, D., Wu, W. (2026). Vectorial Fast Correlation Attacks. In: Hanaoka, G., Yang, BY. (eds) Advances in Cryptology – ASIACRYPT 2025. ASIACRYPT 2025. Lecture Notes in Computer Science, vol 16245. Springer, Singapore. https://doi.org/10.1007/978-981-95-5018-0_10. Artifact available at https://artifacts.iacr.org/asiacrypt/2025/a17