Differential Biases in Reduced-Round Keccak

被引:0
|
作者
Das, Sourav [1 ]
Meier, Willi [1 ]
机构
[1] Alcatel Lucent India Ltd, Windisch, Switzerland
来源
关键词
SHA-3; Propagation Analysis; Double-kernel; TDA;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Keccak hash function is the winner of the SHA-3 competition. In this paper, we examine differential propagation properties of Keccak constituent functions. We discover that low-weight differentials produce a number of biased and fixed difference bits in the state after two rounds and provide a theoretical explanation for the existence of such a bias. We also describe several other propagation properties of Keccak with respect to differential cryptanalysis. Combining our propagation analysis with results from the existing literature we find distinguishers on six rounds of the Keccak hash function with complexity 2(52) for the first time in this paper.
引用
收藏
页码:69 / 87
页数:19
相关论文
共 50 条
  • [11] Impossible differential cryptanalysis of reduced-round ARIA and Camellia
    Wu, Wen-Ling
    Zhang, Wen-Tao
    Feng, Deng-Guo
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (03) : 449 - 456
  • [12] Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia
    吴文玲
    张文涛
    冯登国
    Journal of Computer Science & Technology, 2007, (03) : 449 - 456
  • [13] New Impossible Differential Cryptanalysis of Reduced-Round Camellia
    Li, Leibo
    Chen, Jiazhe
    Jia, Keting
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 26 - +
  • [14] Biased differential distinguisher - Cryptanalysis of reduced-round SKINNY
    Dunkelman, Orr
    Huang, Senyang
    Lambooij, Eran
    Perle, Stav
    INFORMATION AND COMPUTATION, 2021, 281
  • [15] Impossible Differential Cryptanalysis of reduced-round TEA and XTEA
    Hajari, Masroor
    Azimi, Seyyed Arash
    Aghdaie, Poorya
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 58 - 63
  • [16] Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia
    Wen-Ling Wu
    Wen-Tao Zhang
    Deng-Guo Feng
    Journal of Computer Science and Technology, 2007, 22 : 449 - 456
  • [17] Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
    Wu, Wenling
    Zhang, Lei
    Zhang, Wentao
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 442 - 456
  • [18] New impossible differential attacks on reduced-round Crypton
    Mala, Hamid
    Shakiba, Mohsen
    Dakhilalian, Mohammad
    COMPUTER STANDARDS & INTERFACES, 2010, 32 (04) : 222 - 227
  • [19] Related-Key Differential Attacks on Reduced-Round LBlock
    Weng, Tianling
    Cui, Tingting
    Yang, Ting
    Guo, Yinghua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [20] New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
    Liu, Ya
    Li, Leibo
    Gu, Dawu
    Wang, Xiaoyun
    Liu, Zhiqiang
    Chen, Jiazhe
    Li, Wei
    FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 90 - 109