Rotational cryptanalysis of round-reduced Keccak


Autoria(s): Morawiecki, Pawel; Pieprzyk, Josef; Srebrny, Marian
Data(s)

2014

Resumo

In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST’s contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-f[1600] permutation — the main building block of Keccak hash function.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/82454/

Publicador

Springer Heidelberg New York Dordrecht London

Relação

http://eprints.qut.edu.au/82454/2/__staffhome.qut.edu.au_staffgroupm%24_meaton_Desktop_Draft%20paper_Pieprzyk.pdf

DOI:10.1007/978-3-662-43933-3_13

Morawiecki, Pawel, Pieprzyk, Josef, & Srebrny, Marian (2014) Rotational cryptanalysis of round-reduced Keccak. Lecture Notes in Computer Science [Proceedings of the 20th International Workshop on Fast Software Encryption - FSE 2013], 8424, pp. 241-262.

Direitos

Copyright 2014 Springer-Verlag Berlin Heidelberg

The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-662-43933-3_13

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Preimage attack #KECCAK #Rotational cryptanalysis #SHA-3
Tipo

Journal Article