Paper 2017/1028

Cryptanalysis of 1-Round KECCAK

Rajendra Kumar, Mahesh Sreekumar Rajasree, and Hoda AlKhzaimi

Abstract

In this paper, we give the first pre-image attack against 1- round KECCAK-512 hash function, which works for all variants of 1- round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.

Note: In the previous submission we gave preimage attack with 5 message blocks. With similar analysis we brought it down to 2 message block.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
CryptanalysisKECCAKSHA-3PreimageCollision
Contact author(s)
rjndr @ iitk ac in
mahesr @ iitk ac in
hoda alkhzaimi @ nyu edu
History
2017-11-01: revised
2017-10-28: received
See all versions
Short URL
https://ia.cr/2017/1028
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/1028,
      author = {Rajendra Kumar and Mahesh Sreekumar Rajasree and Hoda AlKhzaimi},
      title = {Cryptanalysis of 1-Round KECCAK},
      howpublished = {Cryptology ePrint Archive, Paper 2017/1028},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/1028}},
      url = {https://eprint.iacr.org/2017/1028}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.