Improved Preimage Attacks on 3-Round Keccak-224/256
In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second message blocks in two stages. Under this str...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2021-09-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/9175 |
id |
doaj-67b5c7f0a82b497ca3ebbc81e6996a1e |
---|---|
record_format |
Article |
spelling |
doaj-67b5c7f0a82b497ca3ebbc81e6996a1e2021-09-25T14:25:20ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2021-09-012021310.46586/tosc.v2021.i3.84-101Improved Preimage Attacks on 3-Round Keccak-224/256Xiaoen Lin0Le He1Hongbo Yu2Department of Computer Science and Technology, Tsinghua University, Beijing, ChinaDepartment of Computer Science and Technology, Tsinghua University, Beijing, ChinaDepartment of Computer Science and Technology, Tsinghua University, Beijing, China In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second message blocks in two stages. Under this strategy, they design a new linear structure for 2-round Keccak-224/256 with 194 degrees of freedom left, which is able to construct the second message block with a complexity of 231/262. However, the bottleneck of this strategy is that the first stage needs much more expense than the second one. Therefore, we improve the first stage by using two techniques. The first technique is constructing multi-block messages rather than one-block message in the first stage, which can reach a better inner state. The second technique is setting restricting equations more efficiently, which can work in 3-round Keccak-256. As a result, the complexity of finding a preimage for 3-round Keccak-224/256 can be decreased from 238/281 to 232/265. https://tosc.iacr.org/index.php/ToSC/article/view/9175KeccakSHA-3Preimage attackLinear structure |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Xiaoen Lin Le He Hongbo Yu |
spellingShingle |
Xiaoen Lin Le He Hongbo Yu Improved Preimage Attacks on 3-Round Keccak-224/256 IACR Transactions on Symmetric Cryptology Keccak SHA-3 Preimage attack Linear structure |
author_facet |
Xiaoen Lin Le He Hongbo Yu |
author_sort |
Xiaoen Lin |
title |
Improved Preimage Attacks on 3-Round Keccak-224/256 |
title_short |
Improved Preimage Attacks on 3-Round Keccak-224/256 |
title_full |
Improved Preimage Attacks on 3-Round Keccak-224/256 |
title_fullStr |
Improved Preimage Attacks on 3-Round Keccak-224/256 |
title_full_unstemmed |
Improved Preimage Attacks on 3-Round Keccak-224/256 |
title_sort |
improved preimage attacks on 3-round keccak-224/256 |
publisher |
Ruhr-Universität Bochum |
series |
IACR Transactions on Symmetric Cryptology |
issn |
2519-173X |
publishDate |
2021-09-01 |
description |
In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second message blocks in two stages. Under this strategy, they design a new linear structure for 2-round Keccak-224/256 with 194 degrees of freedom left, which is able to construct the second message block with a complexity of 231/262. However, the bottleneck of this strategy is that the first stage needs much more expense than the second one. Therefore, we improve the first stage by using two techniques. The first technique is constructing multi-block messages rather than one-block message in the first stage, which can reach a better inner state. The second technique is setting restricting equations more efficiently, which can work in 3-round Keccak-256. As a result, the complexity of finding a preimage for 3-round Keccak-224/256 can be decreased from 238/281 to 232/265.
|
topic |
Keccak SHA-3 Preimage attack Linear structure |
url |
https://tosc.iacr.org/index.php/ToSC/article/view/9175 |
work_keys_str_mv |
AT xiaoenlin improvedpreimageattackson3roundkeccak224256 AT lehe improvedpreimageattackson3roundkeccak224256 AT hongboyu improvedpreimageattackson3roundkeccak224256 |
_version_ |
1717368717442023424 |