[Resource Topic] 2015/1085: Malicious Keccak

Welcome to the resource topic for 2015/1085

Title:
Malicious Keccak

Authors: Pawel Morawiecki

Abstract:

In this paper, we investigate Keccak — the cryptographic hash function adopted as the SHA-3 standard. We propose a malicious variant of the function, where new round constants are introduced. We show that for such the variant, collision and preimage attacks are possible. We also identify a class of weak keys for the malicious Keccak working in the MAC mode. Ideas presented in the paper were verified by implementing the attacks on the function with the 128-bit hash.

ePrint: https://eprint.iacr.org/2015/1085

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .