[Resource Topic] 2013/561: Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis

Welcome to the resource topic for 2013/561

Title:
Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis

Authors: Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus

Abstract:

In this paper we use differential cryptanalysis to attack the winner of the SHA-3 competition, namely Keccak hash function. Despite more than 6 years of intensive cryptanalysis there have been known only two preimage attacks which reach 3 (or slightly more) rounds. Our 3-round preimage attack improves the complexity of those two existing attacks and it is obtained with a different technique. We also show the partial preimage attack on the 4-round Keccak, exploiting two properties of the linear step of the Keccak-f permutation.

ePrint: https://eprint.iacr.org/2013/561

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .