Paper 2020/346
Algebraic Attacks on Round-Reduced Keccak/Xoodoo
Fukang Liu, Takanori Isobe, Willi Meier, and Zhonghao Yang
Abstract
Since Keccak was selected as the SHA-3 standard, both its hash mode and keyed mode have attracted lots of third-party cryptanalysis. Especially in recent years, there is progress in analyzing the collision resistance and preimage resistance of round-reduced Keccak. However, for the preimage attacks on round-reduced Keccak-384/512, we found that the linear relations leaked by the hash value are not well exploited when utilizing the current linear structures. To make full use of the
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- hash functionKeccakXoodooalgebraic attackzero-sum
- Contact author(s)
-
liufukangs @ 163 com
takanori isobe @ ai u-hyogo ac jp
willimeier48 @ gmail com
ashzhonghao @ gmail com - History
- 2020-07-04: last of 3 revisions
- 2020-03-26: received
- See all versions
- Short URL
- https://ia.cr/2020/346
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/346, author = {Fukang Liu and Takanori Isobe and Willi Meier and Zhonghao Yang}, title = {Algebraic Attacks on Round-Reduced Keccak/Xoodoo}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/346}, year = {2020}, url = {https://eprint.iacr.org/2020/346} }