Cryptanalysis of 1-round KECCAK

Rajendra Kumar, Mahesh Sreekumar Rajasree, Hoda Alkhzaimi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we give the first pre-image attack against 1-round KECCAK-512 hash function, which works for all variants of 1-round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.

Original languageEnglish (US)
Title of host publicationProgress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings
PublisherSpringer-Verlag
Pages124-137
Number of pages14
ISBN (Print)9783319893389
DOIs
StatePublished - Jan 1 2018
Event10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018 - Marrakesh, Morocco
Duration: May 7 2018May 9 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10831 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018
CountryMorocco
CityMarrakesh
Period5/7/185/9/18

Fingerprint

Hash functions
Cryptanalysis
Linear equations
Attack
Collision Attack
Hash Function
System of Linear Equations

Keywords

  • Collision
  • Cryptanalysis
  • KECCAK
  • Preimage
  • SHA-3

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Kumar, R., Rajasree, M. S., & Alkhzaimi, H. (2018). Cryptanalysis of 1-round KECCAK. In Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings (pp. 124-137). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10831 LNCS). Springer-Verlag. https://doi.org/10.1007/978-3-319-89339-6_8

Cryptanalysis of 1-round KECCAK. / Kumar, Rajendra; Rajasree, Mahesh Sreekumar; Alkhzaimi, Hoda.

Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Springer-Verlag, 2018. p. 124-137 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10831 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kumar, R, Rajasree, MS & Alkhzaimi, H 2018, Cryptanalysis of 1-round KECCAK. in Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10831 LNCS, Springer-Verlag, pp. 124-137, 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018, Marrakesh, Morocco, 5/7/18. https://doi.org/10.1007/978-3-319-89339-6_8
Kumar R, Rajasree MS, Alkhzaimi H. Cryptanalysis of 1-round KECCAK. In Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Springer-Verlag. 2018. p. 124-137. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-89339-6_8
Kumar, Rajendra ; Rajasree, Mahesh Sreekumar ; Alkhzaimi, Hoda. / Cryptanalysis of 1-round KECCAK. Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Springer-Verlag, 2018. pp. 124-137 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{6486446af89a43628e0eb479b4d97808,
title = "Cryptanalysis of 1-round KECCAK",
abstract = "In this paper, we give the first pre-image attack against 1-round KECCAK-512 hash function, which works for all variants of 1-round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.",
keywords = "Collision, Cryptanalysis, KECCAK, Preimage, SHA-3",
author = "Rajendra Kumar and Rajasree, {Mahesh Sreekumar} and Hoda Alkhzaimi",
year = "2018",
month = "1",
day = "1",
doi = "10.1007/978-3-319-89339-6_8",
language = "English (US)",
isbn = "9783319893389",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer-Verlag",
pages = "124--137",
booktitle = "Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings",

}

TY - GEN

T1 - Cryptanalysis of 1-round KECCAK

AU - Kumar, Rajendra

AU - Rajasree, Mahesh Sreekumar

AU - Alkhzaimi, Hoda

PY - 2018/1/1

Y1 - 2018/1/1

N2 - In this paper, we give the first pre-image attack against 1-round KECCAK-512 hash function, which works for all variants of 1-round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.

AB - In this paper, we give the first pre-image attack against 1-round KECCAK-512 hash function, which works for all variants of 1-round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.

KW - Collision

KW - Cryptanalysis

KW - KECCAK

KW - Preimage

KW - SHA-3

UR - http://www.scopus.com/inward/record.url?scp=85045919103&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85045919103&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-89339-6_8

DO - 10.1007/978-3-319-89339-6_8

M3 - Conference contribution

AN - SCOPUS:85045919103

SN - 9783319893389

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 124

EP - 137

BT - Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings

PB - Springer-Verlag

ER -