[Resource Topic] 2011/420: Unaligned Rebound Attack - Application to Keccak

Welcome to the resource topic for 2011/420

Title:
Unaligned Rebound Attack - Application to Keccak

Authors: Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei

Abstract:

We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we are able to derive most of the best known differential paths for up to 5 rounds. We use these differential paths in a rebound attack setting and adapt this powerful freedom degrees utilization in order to derive distinguishers for up to 8 rounds of the internal permutations of the submitted version of Keccak. The complexity of the 8 round distinguisher is 2^{491.47}. Our results have been implemented and verified experimentally on a small version of Keccak. This is currently the best known differential attack against the internal permutations of Keccak.

ePrint: https://eprint.iacr.org/2011/420

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .