International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 04 September 2013

Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
ePrint Report ePrint Report
In this paper we use differential cryptanalysis to attack the winner of the SHA-3 competition, namely Keccak hash function. Despite more than 6 years of intensive cryptanalysis there have been known only two preimage attacks which reach 3 (or slightly more) rounds. Our 3-round preimage attack improves the complexity of those two existing attacks and it is obtained with a different technique. We also show the partial preimage attack on the 4-round Keccak, exploiting two properties of the linear step of the Keccak-f permutation.

Expand

Additional news items may be found on the IACR news page.