Cryptology ePrint Archive: Report 2012/546

Rotational cryptanalysis of round-reduced Keccak

Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny

Abstract: In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST's contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-f[1600] permutation --- the main building block of Keccak hash function.

Category / Keywords: preimage attack, Keccak, rotational cryptanalysis, SHA-3

Date: received 18 Sep 2012, last revised 21 Feb 2013

Contact author: pawelm at wsh-kielce edu pl

Available format(s): PDF | BibTeX Citation

Note: Complexity of 5-round distinguisher has been reduced. Also the paper write-up has been improved aiming at more clarity and rigorous treatment of notions and definitions.

Version: 20130221:124106 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]