In this paper, we give the first pre-image attack against 1-round KECCAK-512 hash function, which works for all variants of 1-round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.
CITATION STYLE
Kumar, R., Rajasree, M. S., & AlKhzaimi, H. (2018). Cryptanalysis of 1-round KECCAK. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10831 LNCS, pp. 124–137). Springer Verlag. https://doi.org/10.1007/978-3-319-89339-6_8
Mendeley helps you to discover research relevant for your work.