Paper 2026/314

Understanding Multi-Query Attacks on Key-Then-Hash Functions

Jonathan Fuchs, Radboud University Nijmegen
Abstract

We present multi-query attacks on key-then-hash (KTH) functions in the blinded keyed hash model that achieve an advantage growing quadratically in the number of queries up to a small constant factor from the information-theoretic upper bound. We introduce three families of attacks. Catch attacks exploit the group structure of the digest space and achieve deterministic success with $2\sqrt{\varepsilon^{-1}}$ queries. Group attacks embed high-probability differentials into subgroups of the message space of quadratic advantage. Translation attacks exploit offset-invariance to linearly scale any existing attack. Our attacks apply in two concrete settings: with $\Delta$ fixed to $0$, they target the compression phase of farfalle-based primitives such as Xoofff, and with $\Delta$ as a free parameter, they target deck-based wide block cipher constructions such as the double-decker. We connect optimal query set construction to results in additive combinatorics and generalize our results to concatenated KTH functions. Experiments on NH and Xoodoo[3] show our attacks reach an advantage within a factor $2^{4}$ of the theoretical bound. Our analysis reveals that for bit-sliced permutations with degree-2 round functions, solution set overlap is inherent, limiting but not preventing the attacker from approaching the bound. Our experiments highlight that trail cores with a large number of active columns in the last round are particularly dangerous for KTH functions, introducing a new criterion for the design of permutations used in such constructions.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint.
Keywords
message authentication codeskey-then-hashmulti-query securityoffset-invarianceprotected hashblinded keyed hash
Contact author(s)
jonathan fuchs @ ru nl
History
2026-02-21: approved
2026-02-18: received
See all versions
Short URL
https://ia.cr/2026/314
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2026/314,
      author = {Jonathan Fuchs},
      title = {Understanding Multi-Query Attacks on Key-Then-Hash Functions},
      howpublished = {Cryptology {ePrint} Archive, Paper 2026/314},
      year = {2026},
      url = {https://eprint.iacr.org/2026/314}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.