Cryptology ePrint Archive: Report 2011/624
New attacks on Keccak-224 and Keccak-256
Itai Dinur and Orr Dunkelman and Adi Shamir
Abstract: The Keccak hash function is one of the five finalists in NIST's SHA-3
competition, and so far it showed remarkable resistance against
practical collision finding attacks: After several years of
cryptanalysis and a lot of effort, the largest number of Keccak
rounds for which actual collisions were found was only 2. In this
paper we develop improved collision finding techniques which enable
us to double this number. More precisely, we can now find within a
few minutes on a single PC actual collisions in standard Keccak-224
and Keccak-256, where the only modification is to reduce their number
of rounds to 4. When we apply our techniques to 5-round Keccak, we
can get in a few days excellent near collisions, where the Hamming
distance is 5 in the case of Keccak-224 and 10 in the case of
Keccak-256. Our new attack combines differential and algebraic
techniques, and uses the fact that each round of Keccak is only a
quadratic mapping in order to efficiently find pairs of messages
which follow a high probability differential characteristic.
Category / Keywords: secret-key cryptography / Cryptanalysis, SHA-3, Keccak, collision, near-collision, practical attack
Date: received 19 Nov 2011, last revised 19 Nov 2011
Contact author: itaid at weizmann ac il
Available formats: PDF | BibTeX Citation
Version: 20111121:182939 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]