2015
DOI: 10.1007/978-3-662-48116-5_26
|View full text |Cite
|
Sign up to set email alerts
|

Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- $$f$$ f Permutation

Abstract: We introduce internal differential boomerang distinguisher as a combination of internal differentials and classical boomerang distinguishers. The new boomerangs can be successful against cryptographic primitives having high-probability round-reduced internal differential characteristics. The internal differential technique, which follow the evolution of differences between parts of the state, is particularly meaningful for highly symmetric functions like the inner permutation Keccak-f of the hash functions def… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…Since the competition SHA-3, the Keccak-p permutation (described in 2.3) has been widely analyzed [BCC11,DGPW12,JN15]. In the literature, reduced versions of Ketje have been cryptanalyzed with cube attacks [DLWQ17] and linearization techniques [GLS16].…”
Section: Related Workmentioning
confidence: 99%
“…Since the competition SHA-3, the Keccak-p permutation (described in 2.3) has been widely analyzed [BCC11,DGPW12,JN15]. In the literature, reduced versions of Ketje have been cryptanalyzed with cube attacks [DLWQ17] and linearization techniques [GLS16].…”
Section: Related Workmentioning
confidence: 99%
“…While arguably the majority of the analyses focuses on the 1600-bit variant of the Keccak-f permutation, the similarity in structure of the permutation usually allows to apply the same techniques on smaller permutation variants. A good overview on existing analysis results on Keccak can be found in [JN15]. In this section, we recapitulate the from our point of view most relevant attacks on Keccak and discuss the applicability to our schemes.…”
Section: Security Analysismentioning
confidence: 99%
“…As one of the most important cryptographic standards, Keccak attracts a lot of attention from world wide researchers and engineers. Till now, many cryptanalysis results [BCC11,DDS12,DDS13,DGPW12,GLS16,JN15,MPS13] and evaluation tools [DA12,DEM15,MDA17] have been proposed, including the recent impressive collision attacks [QSLG17,SLG17].…”
Section: Introductionmentioning
confidence: 99%