Paper 2013/561

Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis

Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, and Michal Straus

Abstract

In this paper we use differential cryptanalysis to attack the winner of the SHA-3 competition, namely Keccak hash function. Despite more than 6 years of intensive cryptanalysis there have been known only two preimage attacks which reach 3 (or slightly more) rounds. Our 3-round preimage attack improves the complexity of those two existing attacks and it is obtained with a different technique. We also show the partial preimage attack on the 4-round Keccak, exploiting two properties of the linear step of the Keccak-f permutation.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
preimage attackKeccakdifferential cryptanalysisSHA-3
Contact author(s)
pawel morawiecki @ gmail com
History
2013-09-04: received
Short URL
https://ia.cr/2013/561
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/561,
      author = {Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus},
      title = {Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis},
      howpublished = {Cryptology ePrint Archive, Paper 2013/561},
      year = {2013},
      note = {\url{https://eprint.iacr.org/2013/561}},
      url = {https://eprint.iacr.org/2013/561}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.