International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 09 November 2015

Pawel Morawiecki
ePrint Report ePrint Report
In this paper, we investigate Keccak --- the cryptographic hash function adopted as the SHA-3 standard. We propose a malicious variant of the function, where new round constants are introduced. We show that for such the variant, collision and preimage attacks are possible. We also identify a class of weak keys for the malicious Keccak working in the MAC mode. Ideas presented in the paper were verified by implementing the attacks on the function with the 128-bit hash.

Expand

Additional news items may be found on the IACR news page.