Rotational cryptanalysis of round-reduced Keccak
Data(s) |
2014
|
---|---|
Resumo |
In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST’s contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-f[1600] permutation — the main building block of Keccak hash function. |
Formato |
application/pdf |
Identificador | |
Publicador |
Springer Heidelberg New York Dordrecht London |
Relação |
http://eprints.qut.edu.au/82454/2/__staffhome.qut.edu.au_staffgroupm%24_meaton_Desktop_Draft%20paper_Pieprzyk.pdf DOI:10.1007/978-3-662-43933-3_13 Morawiecki, Pawel, Pieprzyk, Josef, & Srebrny, Marian (2014) Rotational cryptanalysis of round-reduced Keccak. Lecture Notes in Computer Science [Proceedings of the 20th International Workshop on Fast Software Encryption - FSE 2013], 8424, pp. 241-262. |
Direitos |
Copyright 2014 Springer-Verlag Berlin Heidelberg The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-662-43933-3_13 |
Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
Palavras-Chave | #Preimage attack #KECCAK #Rotational cryptanalysis #SHA-3 |
Tipo |
Journal Article |