Cryptanalysis of 1-round KECCAK

Rajendra Kumar, Mahesh Sreekumar Rajasree, Hoda Alkhzaimi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    In this paper, we give the first pre-image attack against 1-round KECCAK-512 hash function, which works for all variants of 1-round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.

    Original languageEnglish (US)
    Title of host publicationProgress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings
    PublisherSpringer-Verlag
    Pages124-137
    Number of pages14
    ISBN (Print)9783319893389
    DOIs
    StatePublished - Jan 1 2018
    Event10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018 - Marrakesh, Morocco
    Duration: May 7 2018May 9 2018

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume10831 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018
    CountryMorocco
    CityMarrakesh
    Period5/7/185/9/18

    Fingerprint

    Hash functions
    Cryptanalysis
    Linear equations
    Attack
    Collision Attack
    Hash Function
    System of Linear Equations

    Keywords

    • Collision
    • Cryptanalysis
    • KECCAK
    • Preimage
    • SHA-3

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • Computer Science(all)

    Cite this

    Kumar, R., Rajasree, M. S., & Alkhzaimi, H. (2018). Cryptanalysis of 1-round KECCAK. In Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings (pp. 124-137). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10831 LNCS). Springer-Verlag. https://doi.org/10.1007/978-3-319-89339-6_8

    Cryptanalysis of 1-round KECCAK. / Kumar, Rajendra; Rajasree, Mahesh Sreekumar; Alkhzaimi, Hoda.

    Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Springer-Verlag, 2018. p. 124-137 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10831 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Kumar, R, Rajasree, MS & Alkhzaimi, H 2018, Cryptanalysis of 1-round KECCAK. in Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10831 LNCS, Springer-Verlag, pp. 124-137, 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018, Marrakesh, Morocco, 5/7/18. https://doi.org/10.1007/978-3-319-89339-6_8
    Kumar R, Rajasree MS, Alkhzaimi H. Cryptanalysis of 1-round KECCAK. In Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Springer-Verlag. 2018. p. 124-137. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-89339-6_8
    Kumar, Rajendra ; Rajasree, Mahesh Sreekumar ; Alkhzaimi, Hoda. / Cryptanalysis of 1-round KECCAK. Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Springer-Verlag, 2018. pp. 124-137 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    @inproceedings{6486446af89a43628e0eb479b4d97808,
    title = "Cryptanalysis of 1-round KECCAK",
    abstract = "In this paper, we give the first pre-image attack against 1-round KECCAK-512 hash function, which works for all variants of 1-round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.",
    keywords = "Collision, Cryptanalysis, KECCAK, Preimage, SHA-3",
    author = "Rajendra Kumar and Rajasree, {Mahesh Sreekumar} and Hoda Alkhzaimi",
    year = "2018",
    month = "1",
    day = "1",
    doi = "10.1007/978-3-319-89339-6_8",
    language = "English (US)",
    isbn = "9783319893389",
    series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
    publisher = "Springer-Verlag",
    pages = "124--137",
    booktitle = "Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings",

    }

    TY - GEN

    T1 - Cryptanalysis of 1-round KECCAK

    AU - Kumar, Rajendra

    AU - Rajasree, Mahesh Sreekumar

    AU - Alkhzaimi, Hoda

    PY - 2018/1/1

    Y1 - 2018/1/1

    N2 - In this paper, we give the first pre-image attack against 1-round KECCAK-512 hash function, which works for all variants of 1-round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.

    AB - In this paper, we give the first pre-image attack against 1-round KECCAK-512 hash function, which works for all variants of 1-round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.

    KW - Collision

    KW - Cryptanalysis

    KW - KECCAK

    KW - Preimage

    KW - SHA-3

    UR - http://www.scopus.com/inward/record.url?scp=85045919103&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=85045919103&partnerID=8YFLogxK

    U2 - 10.1007/978-3-319-89339-6_8

    DO - 10.1007/978-3-319-89339-6_8

    M3 - Conference contribution

    SN - 9783319893389

    T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    SP - 124

    EP - 137

    BT - Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings

    PB - Springer-Verlag

    ER -