Improved Preimage Attacks on 3-Round Keccak-224/256

In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second message blocks in two stages. Under this str...

Full description

Bibliographic Details
Main Authors: Xiaoen Lin, Le He, Hongbo Yu
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2021-09-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/9175
id doaj-67b5c7f0a82b497ca3ebbc81e6996a1e
record_format Article
spelling doaj-67b5c7f0a82b497ca3ebbc81e6996a1e2021-09-25T14:25:20ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2021-09-012021310.46586/tosc.v2021.i3.84-101Improved Preimage Attacks on 3-Round Keccak-224/256Xiaoen Lin0Le He1Hongbo Yu2Department of Computer Science and Technology, Tsinghua University, Beijing, ChinaDepartment of Computer Science and Technology, Tsinghua University, Beijing, ChinaDepartment of Computer Science and Technology, Tsinghua University, Beijing, China In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second message blocks in two stages. Under this strategy, they design a new linear structure for 2-round Keccak-224/256 with 194 degrees of freedom left, which is able to construct the second message block with a complexity of 231/262. However, the bottleneck of this strategy is that the first stage needs much more expense than the second one. Therefore, we improve the first stage by using two techniques. The first technique is constructing multi-block messages rather than one-block message in the first stage, which can reach a better inner state. The second technique is setting restricting equations more efficiently, which can work in 3-round Keccak-256. As a result, the complexity of finding a preimage for 3-round Keccak-224/256 can be decreased from 238/281 to 232/265. https://tosc.iacr.org/index.php/ToSC/article/view/9175KeccakSHA-3Preimage attackLinear structure
collection DOAJ
language English
format Article
sources DOAJ
author Xiaoen Lin
Le He
Hongbo Yu
spellingShingle Xiaoen Lin
Le He
Hongbo Yu
Improved Preimage Attacks on 3-Round Keccak-224/256
IACR Transactions on Symmetric Cryptology
Keccak
SHA-3
Preimage attack
Linear structure
author_facet Xiaoen Lin
Le He
Hongbo Yu
author_sort Xiaoen Lin
title Improved Preimage Attacks on 3-Round Keccak-224/256
title_short Improved Preimage Attacks on 3-Round Keccak-224/256
title_full Improved Preimage Attacks on 3-Round Keccak-224/256
title_fullStr Improved Preimage Attacks on 3-Round Keccak-224/256
title_full_unstemmed Improved Preimage Attacks on 3-Round Keccak-224/256
title_sort improved preimage attacks on 3-round keccak-224/256
publisher Ruhr-Universität Bochum
series IACR Transactions on Symmetric Cryptology
issn 2519-173X
publishDate 2021-09-01
description In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second message blocks in two stages. Under this strategy, they design a new linear structure for 2-round Keccak-224/256 with 194 degrees of freedom left, which is able to construct the second message block with a complexity of 231/262. However, the bottleneck of this strategy is that the first stage needs much more expense than the second one. Therefore, we improve the first stage by using two techniques. The first technique is constructing multi-block messages rather than one-block message in the first stage, which can reach a better inner state. The second technique is setting restricting equations more efficiently, which can work in 3-round Keccak-256. As a result, the complexity of finding a preimage for 3-round Keccak-224/256 can be decreased from 238/281 to 232/265.
topic Keccak
SHA-3
Preimage attack
Linear structure
url https://tosc.iacr.org/index.php/ToSC/article/view/9175
work_keys_str_mv AT xiaoenlin improvedpreimageattackson3roundkeccak224256
AT lehe improvedpreimageattackson3roundkeccak224256
AT hongboyu improvedpreimageattackson3roundkeccak224256
_version_ 1717368717442023424