eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2017/1028

Cryptanalysis of 1-Round KECCAK

Rajendra Kumar, Mahesh Sreekumar Rajasree, and Hoda AlKhzaimi

Abstract

In this paper, we give the first pre-image attack against 1- round KECCAK-512 hash function, which works for all variants of 1- round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.

Note: In the previous submission we gave preimage attack with 5 message blocks. With similar analysis we brought it down to 2 message block.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
CryptanalysisKECCAKSHA-3PreimageCollision
Contact author(s)
rjndr @ iitk ac in
mahesr @ iitk ac in
hoda alkhzaimi @ nyu edu
History
2017-11-01: revised
2017-10-28: received
See all versions
Short URL
https://ia.cr/2017/1028
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/1028,
      author = {Rajendra Kumar and Mahesh Sreekumar Rajasree and Hoda AlKhzaimi},
      title = {Cryptanalysis of 1-Round KECCAK},
      howpublished = {Cryptology ePrint Archive, Paper 2017/1028},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/1028}},
      url = {https://eprint.iacr.org/2017/1028}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.