Differential Biases in Reduced-Round Keccak

被引:0
|
作者
Das, Sourav [1 ]
Meier, Willi [1 ]
机构
[1] Alcatel Lucent India Ltd, Windisch, Switzerland
来源
关键词
SHA-3; Propagation Analysis; Double-kernel; TDA;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Keccak hash function is the winner of the SHA-3 competition. In this paper, we examine differential propagation properties of Keccak constituent functions. We discover that low-weight differentials produce a number of biased and fixed difference bits in the state after two rounds and provide a theoretical explanation for the existence of such a bias. We also describe several other propagation properties of Keccak with respect to differential cryptanalysis. Combining our propagation analysis with results from the existing literature we find distinguishers on six rounds of the Keccak hash function with complexity 2(52) for the first time in this paper.
引用
收藏
页码:69 / 87
页数:19
相关论文
共 50 条
  • [41] Differential-algebraic cryptanalysis of reduced-round of Serpent-256
    MeiQin Wang
    XiaoYun Wang
    Lucas C.K. Hui
    Science China Information Sciences, 2010, 53 : 546 - 556
  • [42] Improved differential-linear cryptanalyslis of reduced-round SAFER++
    Zhang, WT
    Qing, SH
    Wu, WL
    CHINESE JOURNAL OF ELECTRONICS, 2004, 13 (01): : 111 - 115
  • [43] Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES
    Niu, Chao
    Li, Muzhou
    Wang, Meiqin
    Wang, Qingju
    Yiu, Siu-Ming
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 223 - 245
  • [44] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Long Wen
    Mei-Qin Wang
    Jing-Yuan Zhao
    Journal of Computer Science and Technology, 2014, 29 : 165 - 176
  • [45] Differential-algebraic cryptanalysis of reduced-round of Serpent-256
    Wang MeiQin
    Wang XiaoYun
    Hui, Lucas C. K.
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 546 - 556
  • [46] Rotational Cryptanalysis of Round-Reduced KECCAK
    Morawiecki, Pawel
    Pieprzyk, Josef
    Srebrny, Marian
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 241 - 262
  • [47] Collision attack on reduced-round Camellia
    WU Wenling & FENG Dengguo State Key Laboratory of Information Security
    Science in China(Series F:Information Sciences), 2005, (01) : 78 - 90
  • [48] Structural Attack on Reduced-Round Skipjack
    Zhang, Jiyan
    Cui, Ting
    Jin, Chenhui
    IEEE ACCESS, 2018, 6 : 3176 - 3183
  • [49] A Cube Attack on a Reduced-Round Sycon
    Cho, Minjeong
    Eom, Hyejin
    Tcydenova, Erzhena
    Lee, Changhoon
    ELECTRONICS, 2022, 11 (21)
  • [50] Integral Cryptanalysis of Reduced-round KASUMI
    Sugio, Nobuyuki
    Igarashi, Yasutaka
    Kaneko, Toshinobu
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 447 - 451