Rotational cryptanalysis of round-reduced Keccak
Morawiecki, Pawel, Pieprzyk, Josef, & Srebrny, Marian (2014) Rotational cryptanalysis of round-reduced Keccak. Lecture Notes in Computer Science [Proceedings of the 20th International Workshop on Fast Software Encryption - FSE 2013], 8424, pp. 241-262.
In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST’s contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-f permutation — the main building block of Keccak hash function.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Journal Article|
|Additional Information:||Fast Software Encryption : 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. Print ISBN 978-3-662-43932-6|
|Keywords:||Preimage attack, KECCAK, Rotational cryptanalysis, SHA-3|
|Divisions:||Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||Copyright 2014 Springer-Verlag Berlin Heidelberg|
|Copyright Statement:||The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-662-43933-3_13|
|Deposited On:||11 Mar 2015 23:02|
|Last Modified:||14 Mar 2015 02:52|
Repository Staff Only: item control page