2017 | OriginalPaper | Buchkapitel
New Collision Attacks on Round-Reduced Keccak
verfasst von : Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo
Erschienen in: Advances in Cryptology – EUROCRYPT 2017
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Abstract
Keccak
hash function family and some of its variants. Following the framework developed by Dinur et al. at FSE 2012 where 4-round collisions were found by combining 3-round differential trails and 1-round connectors, we extend the connectors one round further hence achieve collision attacks for up to 5 rounds. The extension is possible thanks to the large degree of freedom of the wide internal state. By linearization of all S-boxes of the first round, the problem of finding solutions of 2-round connectors are converted to that of solving a system of linear equations. However, due to the quick freedom reduction from the linearization, the system has solution only when the 3-round differential trails satisfy some additional conditions. We develop a dedicated differential trail search strategy and find such special differentials indeed exist. As a result, the first practical collision attack against 5-round SHAKE128
and two 5-round instances of the Keccak
collision challenges are found with real examples. We also give the first results against 5-round Keccak
-224 and 6-round Keccak
collision challenges. It is remarked that the work here is still far from threatening the security of the full 24-round Keccak
family.