Cryptanalysis of Practical Symmetric-Key Cryptosystems

Distinguishers and structural analysis of practical symmetric-key designs

Symmetric-key cryptography is the backbone of modern secure communication.It includes block ciphers, stream ciphers, hash functions, authenticated encryption schemes, and permutation-based constructions. These primitives are used everywhere: in secure messaging, internet protocols, embedded devices, lightweight cryptography, and post-quantum secure systems.

This project studies the security of practical symmetric-key cryptosystems through cryptanalysis. The goal is to understand whether proposed designs behave like ideal cryptographic objects, or whether their internal structure can be exploited to obtain attacks, distinguishers, weak keys, or key-recovery methods.

Motivation

A symmetric-key primitive may have a clean and elegant design, but its security depends on the absence of hidden exploitable structure. Cryptanalysis plays an important role in this process. It tests the security margins of practical designs, identifies weaknesses in reduced-round versions, and develops new techniques that help the community understand why certain constructions are secure or insecure.

This is especially important for lightweight cryptography, where schemes are designed under strict efficiency constraints. Such constraints often lead to compact internal structures, small-state designs, or carefully optimized nonlinear layers. These features make the schemes efficient, but they also make detailed cryptanalytic evaluation essential.

Core Questions

This project focuses on questions such as:

  • Can we find distinguishers for reduced-round symmetric-key primitives?
  • Do practical designs contain exploitable nonlinear structures?
  • Can weak keys lead to key-recovery attacks?
  • How hard is it to predict monomials arising from cryptographic Boolean functions?
  • Can zero-sum distinguishers reveal non-random behavior in permutation-based designs?
  • What do these attacks say about the security margin of practical cryptographic schemes?

Research Direction

The project studies several themes in symmetric-key cryptanalysis, including:

  • Cryptanalysis of Keccak and round-reduced Keccak
  • Cryptanalysis of Ascon
  • Weak-key and key-recovery attacks on TinyJAMBU
  • Nonlinear structures in cryptographic permutations
  • Zero-sum distinguishers
  • Monomial prediction problems
  • Algebraic and combinatorial methods in symmetric-key cryptanalysis

The broader aim is to develop a clearer understanding of how structural properties of practical symmetric-key primitives can be used in attacks, and how such analysis can guide the design of more secure cryptosystems.



References

  1. Complexity of Monomial Prediction in Cryptography and Machine Learning
    Pranjal DuttaMahesh Sreekumar Rajasree, and Santanu Sarkar
    In 26th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing - SYNASC, 2024
  2. Cryptanalysis of 1-round KECCAK
    Rajendra KumarMahesh Sreekumar Rajasree, and Hoda AlKhzaimi
    In International Conference on Cryptology in Africa - AFRICACRYPT, 2018
  3. Cryptanalysis of round-reduced Keccak using non-linear structures
    Mahesh Sreekumar Rajasree
    In International Conference on Cryptology in India - INDOCRYPT, 2019
  4. Weak-keys and key-recovery attack for TinyJAMBU
    Pranjal DuttaMahesh Sreekumar Rajasree, and Santanu Sarkar
    Scientific Reports, 2022
  5. On the hardness of monomial prediction and zero-sum distinguishers for Ascon
    Pranjal DuttaMahesh Sreekumar Rajasree, and Santanu Sarkar
    In 12th International Workshop on Coding and Cryptography - WCC, 2022