Differential Biases in Reduced-Round Keccak

被引:0
|
作者
Das, Sourav [1 ]
Meier, Willi [1 ]
机构
[1] Alcatel Lucent India Ltd, Windisch, Switzerland
来源
关键词
SHA-3; Propagation Analysis; Double-kernel; TDA;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Keccak hash function is the winner of the SHA-3 competition. In this paper, we examine differential propagation properties of Keccak constituent functions. We discover that low-weight differentials produce a number of biased and fixed difference bits in the state after two rounds and provide a theoretical explanation for the existence of such a bias. We also describe several other propagation properties of Keccak with respect to differential cryptanalysis. Combining our propagation analysis with results from the existing literature we find distinguishers on six rounds of the Keccak hash function with complexity 2(52) for the first time in this paper.
引用
收藏
页码:69 / 87
页数:19
相关论文
共 50 条
  • [21] Differential-Aided Preimage Attacks On Round-Reduced Keccak
    Wei, Congming
    Dong, Xiaoyang
    Meier, Willi
    Qin, Lingyue
    Fu, Ximing
    COMPUTER JOURNAL, 2023, 66 (12): : 3069 - 3091
  • [22] Differential and linear cryptanalysis of a reduced-round SC2000
    Yanami, H
    Shimoyama, T
    Dunkelman, O
    FAST SOFTWARE ENCRYPTION (REVISED PAPERS), 2002, 2365 : 34 - 48
  • [23] Differential-nonlinear cryptoanalysis of reduced-round SAFER++
    Zhang, Wen-Tao
    Qing, Si-Han
    Wu, Wen-Ling
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2003, 40 (06):
  • [24] Impossible Differential Cryptanalysis of Reduced-Round LBlock-s
    Jia P.
    Xu H.
    Lai X.-J.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 966 - 973
  • [25] Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon
    Courtois, Nicolas
    Mourouzis, Theodosis
    Song, Guangyan
    Sepehrdad, Pouyan
    Susil, Petr
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 399 - 404
  • [26] Impossible differential cryptanalysis of reduced-round Camellia-256
    Mala, H.
    Dakhilalian, M.
    Shakiba, M.
    IET INFORMATION SECURITY, 2011, 5 (03) : 129 - 134
  • [27] Differential and rectangle attacks on reduced-round SHACAL-1
    Lu, Jiqiang
    Kim, Jongsung
    Keller, Nathan
    Dunkelman, Orr
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 17 - +
  • [28] Cryptanalysis of Reduced-Round DASH
    刘树生
    龚征
    王立斌
    Journal of Computer Science & Technology, 2013, 28 (01) : 159 - 164
  • [29] Cryptanalysis of Reduced-Round Whirlwind
    Ma, Bingke
    Li, Bao
    Hao, Ronglin
    Li, Xiaoqian
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 20 - 38
  • [30] Cryptanalysis of Reduced-Round SipHash
    He, Le
    Yu, Hongbo
    COMPUTER JOURNAL, 2023, 67 (03): : 875 - 883