Improved Preimage Attacks on 3-Round Keccak-224/256

被引:7
作者
Lin, Xiaoen [1 ]
He, Le [1 ]
Yu, Hongbo [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
关键词
Keccak; SHA-3; Preimage attack; Linear structure;
D O I
10.46586/tosc.v2021.i3.84-101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second message blocks in two stages. Under this strategy, they design a new linear structure for 2-round Keccak-224/256 with 194 degrees of freedom left, which is able to construct the second message block with a complexity of 2(31)/2(62). However, the bottleneck of this strategy is that the first stage needs much more expense than the second one. Therefore, we improve the first stage by using two techniques. The first technique is constructing multi-block messages rather than one-block message in the first stage, which can reach a better inner state. The second technique is setting restricting equations more efficiently, which can work in 3-round Keccak-256. As a result, the complexity of finding a preimage for 3-round Keccak-224/256 can be decreased from 2(38)/2(81) to 2(32)/2(65).
引用
收藏
页码:84 / 101
页数:18
相关论文
共 12 条
[1]  
Dinur I, 2012, LECT NOTES COMPUT SC, V7549, P442, DOI 10.1007/978-3-642-34047-5_25
[2]  
Dinur Itai, 2014, IACR CRYPTOLOGY EPRI, V2014, P259
[3]   Practical Collision Attacks against Round-Reduced SHA-3 [J].
Guo, Jian ;
Liao, Guohong ;
Liu, Guozhen ;
Liu, Meicheng ;
Qiao, Kexin ;
Song, Ling .
JOURNAL OF CRYPTOLOGY, 2020, 33 (01) :228-270
[4]   Linear Structures: Applications to Cryptanalysis of Round-Reduced KECCAK [J].
Guo, Jian ;
Liu, Meicheng ;
Song, Ling .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :249-274
[5]   Conditional Cube Attack on Reduced-Round Keccak Sponge Function [J].
Huang, Senyang ;
Wang, Xiaoyun ;
Xu, Guangwu ;
Wang, Meiqin ;
Zhao, Jingyuan .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 :259-288
[6]   Preimage Attacks on Round-Reduced KECCAK-224/256 via an Allocating Approach [J].
Li, Ting ;
Sun, Yao .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 :556-584
[7]  
National Institute of Standards and Technology, 2015, Sha-3 standard: Permutation-based hash and extendable-output functions, DOI DOI 10.6028/NIST.FIPS.202
[8]  
Naya-Plasencia M, 2011, LECT NOTES COMPUT SC, V7107, P236
[9]   New Collision Attacks on Round-Reduced Keccak [J].
Qiao, Kexin ;
Song, Ling ;
Liu, Meicheng ;
Guo, Jian .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 :216-243
[10]   Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced KECCAK [J].
Song, Ling ;
Liao, Guohong ;
Guo, Jian .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 :428-451