We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we are able to derive most of the best known differential paths for up to 5 rounds. We use these differential paths in a rebound attack setting and adapt this powerful freedom degrees utilization in order to derive distinguishers for up to 8 rounds of the internal permutations of the submitted version of Keccak. The complexity of the 8 round distinguisher is 2 491.47. Our results have been implemented and verified experimentally on a small version of Keccak. © 2012 Springer-Verlag.
CITATION STYLE
Duc, A., Guo, J., Peyrin, T., & Wei, L. (2012). Unaligned rebound attack: Application to Keccak. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7549 LNCS, pp. 402–421). https://doi.org/10.1007/978-3-642-34047-5_23
Mendeley helps you to discover research relevant for your work.