Paper 2026/306

Skipping Class: Algebraic Attacks exploiting weak matrices and operation modes of Poseidon2(b)

Simon-Philipp Merz, ETH Zurich
Àlex Rodríguez García, Universitat Politècnica de Catalunya
Abstract

We present new algebraic attacks on Poseidon2 and Poseidon2b. We exploit the specific structure of the matrices that define the linear layers in the hash function which allows us to improve round-skipping for the constrained-input constrained-output CICO problem. The security of many circuit-friendly hash functions has been measured by their resistance against attacks on the CICO problem. However, we show how to boost our round-skipping attack when directly modelling algebraic preimage attacks of Poseidon2(b) in compression and sponge mode. To the best of our knowledge, our attack provides the first examples where finding preimages is easier than solving the corresponding CICO problem in Poseidon2(b). Furthermore, we describe the first algebraic collision attack that outperforms its algebraic preimage counterpart. We improve over state-of-the-art algebraic attacks for a range of parameters, e.g. for one recommended $128$-bit parameter set we improve over previous state-of-the-art algebraic collision attacks by a factor of $2^{106}$. However, due to the algebraic security margin this does not mean the primitive falls short of its claimed security level. Finally, we discuss how our attacks can be mitigated without affecting the efficiency of Poseidon2(b).

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
CryptanalysisPoseidonRound SkipsAlgebraic cryptanalysis
Contact author(s)
research @ simon-philipp com
arodrigu @ ethz ch
History
2026-02-18: approved
2026-02-18: received
See all versions
Short URL
https://ia.cr/2026/306
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2026/306,
      author = {Simon-Philipp Merz and Àlex Rodríguez García},
      title = {Skipping Class: Algebraic Attacks exploiting weak matrices and operation modes of Poseidon2(b)},
      howpublished = {Cryptology {ePrint} Archive, Paper 2026/306},
      year = {2026},
      url = {https://eprint.iacr.org/2026/306}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.