Preimage Attacks on Round-Reduced KECCAK-224/256 via an Allocating Approach

被引:27
作者
Li, Ting [1 ,2 ]
Sun, Yao [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III | 2019年 / 11478卷
基金
中国国家自然科学基金;
关键词
Cryptanalysis; KECCAK; SHA-3; Preimage attack;
D O I
10.1007/978-3-030-17659-4_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present new preimage attacks on standard KECCAK-224 and KECCAK-256 that are reduced to 3 and 4 rounds. An allocating approach is used in the attacks, and the whole complexity is allocated to two stages, such that fewer constraints are considered and the complexity is lowered in each stage. Specifically, we are trying to find a 2-block preimage, instead of a 1-block one, for a given hash value, and the first and second message blocks are found in two stages, respectively. Both the message blocks are constrained by a set of newly proposed conditions on the middle state, which are weaker than those brought by the initial values and the hash values. Thus, the complexities in the two stages are both lower than that of finding a 1-block preimage directly. Together with the basic allocating approach, an improved method is given to balance the complexities of two stages, and hence, obtains the optimal attacks. As a result, we present the best theoretical preimage attacks on KECCAK-224 and KECCAK-256 that are reduced to 3 and 4 rounds. Moreover, we practically found a (second) preimage for 3-round KECCAK-224 with a complexity of 2(39.39).
引用
收藏
页码:556 / 584
页数:29
相关论文
共 27 条
[1]  
Aumasson Jean-Philippe., 2009, ZERO SUM DISTINGUISH
[2]  
Bernstein DanielJ., 2010, NIST MAILING LIST
[3]  
Bertoni G., 2011, Keccak Implementation Overview-3.1
[4]   Key-Recovery Attacks on Full KRAVATTE [J].
Chaigneau, Colin ;
Fuhr, Thomas ;
Gilbert, Henri ;
Guo, Jian ;
Jean, Jeremy ;
Reinhard, Jean-Rene ;
Song, Ling .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (01) :5-28
[5]  
Chang D., 2014, SHA 3 WORKSH
[6]  
Daemen J, 2012, LECT NOTES COMPUT SC, V7549, P422, DOI 10.1007/978-3-642-34047-5_24
[7]   Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials [J].
Dinur, Itai ;
Dunkelman, Orr ;
Shamir, Adi .
FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 :219-240
[8]   Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function [J].
Dinur, Itai ;
Morawiecki, Pawel ;
Pieprzyk, Josef ;
Srebrny, Marian ;
Straus, Michal .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :733-761
[9]   Improved Practical Attacks on Round-Reduced Keccak [J].
Dinur, Itai ;
Dunkelman, Orr ;
Shamir, Adi .
JOURNAL OF CRYPTOLOGY, 2014, 27 (02) :183-209
[10]  
Dinur I, 2012, LECT NOTES COMPUT SC, V7549, P442, DOI 10.1007/978-3-642-34047-5_25