2014
DOI: 10.1007/978-3-319-06734-6_6
|View full text |Cite
|
Sign up to set email alerts
|

Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…In this regard, it is to be noted that reduced version of K eccak has been attacked through rotational cryptanalysis [25,26]. The very low Hamming weight of employed round constants on Keccak has been utilized to mount the attack.…”
Section: Rotational Cryptanalysismentioning
confidence: 99%
“…In this regard, it is to be noted that reduced version of K eccak has been attacked through rotational cryptanalysis [25,26]. The very low Hamming weight of employed round constants on Keccak has been utilized to mount the attack.…”
Section: Rotational Cryptanalysismentioning
confidence: 99%
“…The standard characteristic that we use relies on the already-known concept of parity kernels, which allows to minimize the number of S-Boxes in two consecutive rounds of Keccak-f . This notion has been described in the submission document [3], and has been used in cryptanalytic results [12,22,31]. The behavior is possible due to two observations: first, a state-difference may be invariant of the θ step if there is an even number of active bits in each of the 320 column of the internal state; and second, an active S-Box in χ (or in χ −1 ) leaves unchanged a 1-bit difference with probability 2 −2 .…”
Section: Standard Differential Characteristicsmentioning
confidence: 99%
“…So far, the best attacks on the hash function in the standard model reach five rounds [14,15], while in the keyed model reach up to nine rounds [16]. For the underlying permutation, the best analysis in terms of complexity reaches six rounds and requires 2 11 queries [22], while in terms of number of rounds, the best is eight and requires 2 491 queries [17].…”
Section: Introductionmentioning
confidence: 99%
“…While the main findings over Keccak concentrated on pre-images and collisions, Keccak-f received considerable attention from what is known as distinguishing attacks. These attacks, which aim at exhibiting non-random behavior by targeting the hermetic sponge strategy [BDPA07], employ various techniques like constrained-input contrained-output (CICO) [AK09], rotational symmetry [MPS12], self-symmetry [KSPC14], ZeroSum [AM09], [DL12,BC10a,BC10b], rebound [DGPW12], cube-tester [DMP + 14] and recently reported internal differential boomerang [JN15]. However, among these, only the ZeroSum distinguisher is able to distinguish all 24-rounds of Keccak-f .…”
Section: Introductionmentioning
confidence: 99%