Welcome to the resource topic for 2013/561
Title:
Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis
Authors: Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
Abstract:In this paper we use differential cryptanalysis to attack the winner of the SHA-3 competition, namely Keccak hash function. Despite more than 6 years of intensive cryptanalysis there have been known only two preimage attacks which reach 3 (or slightly more) rounds. Our 3-round preimage attack improves the complexity of those two existing attacks and it is obtained with a different technique. We also show the partial preimage attack on the 4-round Keccak, exploiting two properties of the linear step of the Keccak-f permutation.
ePrint: https://eprint.iacr.org/2013/561
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .