Cryptology ePrint Archive: Report 2012/546
Rotational cryptanalysis of round-reduced Keccak
Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny
Abstract: In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST's contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-f permutation --- the main building block of Keccak hash function.
Category / Keywords: preimage attack, Keccak, rotational cryptanalysis, SHA-3
Date: received 18 Sep 2012, last revised 21 Feb 2013
Contact author: pawelm at wsh-kielce edu pl
Available formats: PDF | BibTeX Citation
Note: Complexity of 5-round distinguisher has been reduced. Also the paper write-up has been improved aiming at more clarity and rigorous treatment of notions and definitions.
Version: 20130221:124106 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]