Differential Biases in Reduced-Round Keccak

被引:0
|
作者
Das, Sourav [1 ]
Meier, Willi [1 ]
机构
[1] Alcatel Lucent India Ltd, Windisch, Switzerland
来源
关键词
SHA-3; Propagation Analysis; Double-kernel; TDA;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Keccak hash function is the winner of the SHA-3 competition. In this paper, we examine differential propagation properties of Keccak constituent functions. We discover that low-weight differentials produce a number of biased and fixed difference bits in the state after two rounds and provide a theoretical explanation for the existence of such a bias. We also describe several other propagation properties of Keccak with respect to differential cryptanalysis. Combining our propagation analysis with results from the existing literature we find distinguishers on six rounds of the Keccak hash function with complexity 2(52) for the first time in this paper.
引用
收藏
页码:69 / 87
页数:19
相关论文
共 50 条
  • [1] Practical Analysis of Reduced-Round KECCAK
    Naya-Plasencia, Maria
    Rock, Andrea
    Meier, Willi
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 236 - +
  • [2] New Distinguisher on Reduced-Round Keccak Sponge Function
    Huang, Senyang
    Wang, Xiaoyun
    Xu, Guangwu
    Wang, Meiqin
    Zhao, Jingyuan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01) : 242 - 250
  • [3] Conditional Cube Attack on Reduced-Round Keccak Sponge Function
    Huang, Senyang
    Wang, Xiaoyun
    Xu, Guangwu
    Wang, Meiqin
    Zhao, Jingyuan
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 259 - 288
  • [4] Differential cryptanalysis of reduced-round PRESENT
    Wang, Meiqin
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 40 - 49
  • [5] Differential cryptanalysis of a reduced-round SEED
    Yanami, H
    Shimoyama, T
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 186 - 198
  • [6] Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems
    Pei, Junling
    Chen, Lusheng
    IET INFORMATION SECURITY, 2023, 17 (03) : 394 - 406
  • [7] Impossible Differential Attack on Reduced-Round TWINE
    Zheng, Xuexin
    Jia, Keting
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 123 - 143
  • [8] Impossible Differential Cryptanalysis of Reduced-Round SKINNY
    Tolba, Mohamed
    Abdelkhalek, Ahmed
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017, 2017, 10239 : 117 - 134
  • [9] Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore
    Zhang, Li
    Wu, Wenling
    Mao, Yongxia
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 61 - 77
  • [10] Multiple impossible differential cryptanalysis of reduced-round NBC
    Liang, Lifang
    Du, Xiaoni
    CRYPTOLOGIA, 2024,