@inproceedings{c942b72102544dd09c95b3d86bebb47a,
title = "Attacks only get better: How to break FF3 on large domains",
abstract = "We improve the attack of Durak and Vaudenay (CRYPTO{\textquoteright}17) on NIST Format-Preserving Encryption standard FF3, reducing the running time from O(N5) to O(N17 / 6) for domain ZN× ZN. Concretely, DV{\textquoteright}s attack needs about 2 50 operations to recover encrypted 6-digit PINs, whereas ours only spends about 2 30 operations. In realizing this goal, we provide a pedagogical example of how to use distinguishing attacks to speed up slide attacks. In addition, we improve the running time of DV{\textquoteright}s known-plaintext attack on 4-round Feistel of domain ZN× ZN from O(N3) time to just O(N5 / 3) time. We also generalize our attacks to a general domain ZM× ZN, allowing one to recover encrypted SSNs using about 2 50 operations. Finally, we provide some proof-of-concept implementations to empirically validate our results.",
keywords = "Attacks, Format-Preserving Encryption",
author = "Hoang, {Viet Tung} and David Miller and Ni Trieu",
note = "Publisher Copyright: {\textcopyright} International Association for Cryptologic Research 2019.; 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2019 ; Conference date: 19-05-2019 Through 23-05-2019",
year = "2019",
doi = "10.1007/978-3-030-17656-3_4",
language = "English (US)",
isbn = "9783030176556",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "85--116",
editor = "Vincent Rijmen and Yuval Ishai",
booktitle = "Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings",
}