International Association for Cryptologic Research

International Association
for Cryptologic Research

Advances in Cryptology – ASIACRYPT 2025

Vectorial Fast Correlation Attacks


Bin Zhang
University of Chinese Academy of Sciences, China; State Key Laboratory of Cryptology, China; Trusted Computing and Information Assurance Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China; Guizhou shujubao Network Technology Co., Ltd., China; Hefei National Laboratory, China

Ruitao Liu
University of Chinese Academy of Sciences, China; Trusted Computing and Information Assurance Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China; Zhongguancun Laboratory, China

Willi Meier
University of Applied Sciences and Arts Northwestern Switzerland, Switzerland

Siwei Sun
University of Chinese Academy of Sciences, China;

Dengguo Feng
University of Chinese Academy of Sciences, China; State Key Laboratory of Cryptology, China; Trusted Computing and Information Assurance Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China; Zhongguancun Laboratory, China

Wenling Wu
University of Chinese Academy of Sciences, China; Trusted Computing and Information Assurance Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China; Zhongguancun Laboratory, China


Keywords:


Abstract

In this paper, we develop a new framework for vectorial fast correlation attacks, which exploits the vector-wise correlation in a novel and different approach from the previous Golić's attack and gives the complete theoretical predictions of the attack complexities. First, the concept of correlation profile is introduced to characterize both the correlation of some linear approximation and the number of approximations having this correlation, which is not captured by the current notion of capacity or the Squared Euclidean Imbalance (SEI). It is shown how to construct the attack vector by carefully selecting the component-wise linear approximations to make a maximal usage of the inherent correlations. Second, we show how to transform and deliver the secret key information in the constructed vector by sequentially deriving linear subspaces from the original vector when the correlation profile is favorable. We further devise an efficient decoding algorithm to restore the partial secret key information retained in the last linear subspace, which allows for the recovery of the full secret information subsequently. Last, we present improved state recovery attacks on the ISO/IEC 29167-13 standard Grain-128a, the eSTREAM finalists Grain v1 and Sosemanuk, respectively by the new method. We resolve the open problem of detecting the output masks for Grain-like ciphers other than MILP at Crypto 2018 and propose a new algorithm based on graph theory to dissect complicated Boolean functions with many variables and compute its distribution efficiently. For Grain-128a, given around 2106.3 bits of keystream, the time complexity is 2107.7, while for Grain v1, given 267.0 bits of keystream, the attack has a time complexity of 269.6. These attacks are around 212 times better than the best published results at Crypto 2018. For Sosemanuk, we propose a flexible assign-and-solve strategy to mount the first attack faster than exhaustive search of the 128-bit secret key.

Publication

Advances in Cryptology – ASIACRYPT 2025. ASIACRYPT 2025. Lecture Notes in Computer Science, vol 16245. Springer, Singapore.

Paper

Artifact

Artifact number
asiacrypt/2025/a17

Artifact published
December 31, 2025

Badge
IACR Artifacts Functional

README

ZIP (265170 Bytes)  

License
This work is licensed under the MIT License.

Note that license information is supplied by the authors and has not been confirmed by the IACR.


BibTeX How to cite

Zhang, B., Liu, R., Meier, W., Sun, S., Feng, D., Wu, W. (2026). Vectorial Fast Correlation Attacks. In: Hanaoka, G., Yang, BY. (eds) Advances in Cryptology – ASIACRYPT 2025. ASIACRYPT 2025. Lecture Notes in Computer Science, vol 16245. Springer, Singapore. https://doi.org/10.1007/978-981-95-5018-0_10. Artifact available at https://artifacts.iacr.org/asiacrypt/2025/a17