Algebraic Collision Attacks on Keccak
نویسندگان
چکیده
In this paper, we analyze the collision resistance of two smallest versions Keccak which have a width 200 and 400 bits respectively. We show that algebraic linearization techniques can serve cryptanalysis by using some interesting properties linear part round function Keccak. present an attack on could be used in lightweight cryptography reduced to rounds. For Keccak[40, 160] (resp. Keccak[72, 128] Keccak[144, 256]) our has computational complexity 273 252.5 2101.5) calls.
منابع مشابه
New Collision Attacks on Round-Reduced Keccak
In this paper, we focus on collision attacks against Keccak hash function family and some of its variants. Following the framework developed by Dinur et al. at FSE 2012 where 4-round collisions were found by combining 3-round differential trails and 1-round connectors, we extend the connectors one round further hence achieve collision attacks for up to 5 rounds. The extension is possible thanks...
متن کاملAlgebraic Side-Channel Collision Attacks on AES
This paper presents a new powerful side-channel cryptanalytic method algebraic collision attacks representing an efficient class of power analysis being based on both the power consumption information leakage and specific structure of the attacked cryptographic algorithm. This can result in an extremely low measurement count needed for a key recovery. The algebraic collision attacks are well ap...
متن کاملNew Attacks on Keccak-224 and Keccak-256
The Keccak hash function is one of the five finalists in NIST’s SHA-3 competition, and so far it showed remarkable resistance against practical collision finding attacks: After several years of cryptanalysis and a lot of effort, the largest number of Keccak rounds for which actual collisions were found was only 2. In this paper we develop improved collision finding techniques which enable us to...
متن کاملNon-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak
The Keccak hash function is the winner of the SHA-3 competition and became the SHA-3 standard of NIST in 2015. In this paper, we focus on practical collision attacks against round-reduced Keccak hash function, and two main results are achieved: the first practical collision attacks against 5-round Keccak-224 and an instance of 6-round Keccak collision challenge. Both improve the number of pract...
متن کاملCollision attacks on OCB
We show that collision attacks are quite effective on the OCB block cipher mode. When a collision occurs OCB loses its authentication capability. To keep adequate authentication security OCB has to be limited in the amount of data it processes. This restriction is relevant to real-life applications, and casts doubt on the wisdom of using OCB.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transaction on symmetric cryptology
سال: 2021
ISSN: ['2519-173X']
DOI: https://doi.org/10.46586/tosc.v2021.i1.239-268