[Resource Topic] 2025/439: Preimage Attacks on up to 5 Rounds of SHA-3 Using Internal Differentials

Welcome to the resource topic for 2025/439

Title:
Preimage Attacks on up to 5 Rounds of SHA-3 Using Internal Differentials

Authors: Zhongyi Zhang, Chengan Hou, Meicheng Liu

Abstract:

In this paper, we study preimage resistance of the SHA-3 standard. We propose a squeeze meet-in-the-middle attack as a new preimage attack method for the sponge functions. This attack combines the squeeze attack and meet-in-the-middle attack, and is implemented by internal differentials. We analyze the inverse operation of the SHA-3 round function, and develop a new target internal differential algorithm as well as a linearization technique for the Sbox in the backward phase. In addition, we propose the concept of a value-difference distribution table (VDDT) to optimize the attack complexity. These techniques lead to faster preimage attacks on five (out of six) SHA-3 functions reduced to 4 rounds, and also bring preimage attacks on 5 rounds of four SHA-3 instances. The attack techniques are verified by performing practical preimage attack on a small variant of 4-round Keccak.

ePrint: https://eprint.iacr.org/2025/439

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .