Paper 2012/546

Rotational cryptanalysis of round-reduced Keccak

Pawel Morawiecki, Josef Pieprzyk, and Marian Srebrny


In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST's contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-f[1600] permutation --- the main building block of Keccak hash function.

Note: Complexity of 5-round distinguisher has been reduced. Also the paper write-up has been improved aiming at more clarity and rigorous treatment of notions and definitions.

Available format(s)
Publication info
Published elsewhere. Unknown where it was published
preimage attackKeccakrotational cryptanalysisSHA-3
Contact author(s)
pawelm @ wsh-kielce edu pl
2013-02-21: revised
2012-09-22: received
See all versions
Short URL
Creative Commons Attribution


      author = {Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny},
      title = {Rotational cryptanalysis of round-reduced Keccak},
      howpublished = {Cryptology ePrint Archive, Paper 2012/546},
      year = {2012},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.