Unaligned rebound attack: Application to Keccak

41Citations
Citations of this article
44Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we are able to derive most of the best known differential paths for up to 5 rounds. We use these differential paths in a rebound attack setting and adapt this powerful freedom degrees utilization in order to derive distinguishers for up to 8 rounds of the internal permutations of the submitted version of Keccak. The complexity of the 8 round distinguisher is 2 491.47. Our results have been implemented and verified experimentally on a small version of Keccak. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Duc, A., Guo, J., Peyrin, T., & Wei, L. (2012). Unaligned rebound attack: Application to Keccak. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7549 LNCS, pp. 402–421). https://doi.org/10.1007/978-3-642-34047-5_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free