Paper 2012/546

Rotational cryptanalysis of round-reduced Keccak

Pawel Morawiecki, Josef Pieprzyk, and Marian Srebrny

Abstract

In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST's contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-f[1600] permutation --- the main building block of Keccak hash function.

Note: Complexity of 5-round distinguisher has been reduced. Also the paper write-up has been improved aiming at more clarity and rigorous treatment of notions and definitions.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
preimage attackKeccakrotational cryptanalysisSHA-3
Contact author(s)
pawelm @ wsh-kielce edu pl
History
2013-02-21: revised
2012-09-22: received
See all versions
Short URL
https://ia.cr/2012/546
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/546,
      author = {Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny},
      title = {Rotational cryptanalysis of round-reduced Keccak},
      howpublished = {Cryptology ePrint Archive, Paper 2012/546},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/546}},
      url = {https://eprint.iacr.org/2012/546}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.