Paper 2017/1028
Cryptanalysis of 1-Round KECCAK
Rajendra Kumar, Mahesh Sreekumar Rajasree, and Hoda AlKhzaimi
Abstract
In this paper, we give the first pre-image attack against 1- round KECCAK-512 hash function, which works for all variants of 1- round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.
Note: In the previous submission we gave preimage attack with 5 message blocks. With similar analysis we brought it down to 2 message block.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- CryptanalysisKECCAKSHA-3PreimageCollision
- Contact author(s)
-
rjndr @ iitk ac in
mahesr @ iitk ac in
hoda alkhzaimi @ nyu edu - History
- 2017-11-01: revised
- 2017-10-28: received
- See all versions
- Short URL
- https://ia.cr/2017/1028
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/1028, author = {Rajendra Kumar and Mahesh Sreekumar Rajasree and Hoda AlKhzaimi}, title = {Cryptanalysis of 1-Round {KECCAK}}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/1028}, year = {2017}, url = {https://eprint.iacr.org/2017/1028} }