Paper 2019/884

Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures

Mahesh Sreekumar Rajasree

Abstract

In this paper, we present new preimage attacks on KECCAK-384 and KECCAK-512 for 2, 3 and 4 rounds. The attacks are based on non-linear structures (structures that contain quadratic terms). These structures were studied by Guo et al. and Li et al. to give preimage attacks on round reduced KECCAK. We carefully construct non-linear structures such that the quadratic terms are not spread across the whole state. This allows us to create more linear equations between the variables and hash values, leading to better preimage attacks. As a result, we present the best theoretical preimage attack on KECCAK-384 and KECCAK-512 for 2 and 3-rounds and also KECCAK-384 for 4-rounds.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
KECCAKSHA-3Hash functionCryptanalysisPreimage attack
Contact author(s)
mahesr @ iitk ac in
History
2019-08-01: received
Short URL
https://ia.cr/2019/884
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/884,
      author = {Mahesh Sreekumar Rajasree},
      title = {Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures},
      howpublished = {Cryptology ePrint Archive, Paper 2019/884},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/884}},
      url = {https://eprint.iacr.org/2019/884}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.