Cryptology ePrint Archive: Report 2017/1028

Cryptanalysis of 1-Round KECCAK

Rajendra Kumar and Mahesh Sreekumar Rajasree and Hoda AlKhzaimi

Abstract: In this paper, we give the first pre-image attack against 1- round KECCAK-512 hash function, which works for all variants of 1- round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.

Category / Keywords: Cryptanalysis, KECCAK, SHA-3, Preimage, Collision

Date: received 13 Oct 2017, last revised 1 Nov 2017

Contact author: rjndr at iitk ac in, mahesr@iitk ac in, hoda alkhzaimi@nyu edu

Available format(s): PDF | BibTeX Citation

Note: In the previous submission we gave preimage attack with 5 message blocks. With similar analysis we brought it down to 2 message block.

Version: 20171101:171938 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]