Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Abstract In this paper, improved preimage attacks are presented on 3‐round Keccak‐256 and Keccak‐512 and 4‐round Keccak‐256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2023-05-01
|
Series: | IET Information Security |
Subjects: | |
Online Access: | https://doi.org/10.1049/ise2.12103 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832546678581755904 |
---|---|
author | Junling Pei Lusheng Chen |
author_facet | Junling Pei Lusheng Chen |
author_sort | Junling Pei |
collection | DOAJ |
description | Abstract In this paper, improved preimage attacks are presented on 3‐round Keccak‐256 and Keccak‐512 and 4‐round Keccak‐256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3‐round Keccak‐256 and Keccak‐512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 265 and 2440 to 264.79 and 2424, respectively. For preimage attack on 4‐round Keccak‐256, some strategies of saving degrees of freedom are applied to solve Boolean multivariate quadratic systems and reduce the guessing complexity from 2196 to 2188. |
format | Article |
id | doaj-art-8f21096178f94d298ab636b3c5bb2aeb |
institution | Kabale University |
issn | 1751-8709 1751-8717 |
language | English |
publishDate | 2023-05-01 |
publisher | Wiley |
record_format | Article |
series | IET Information Security |
spelling | doaj-art-8f21096178f94d298ab636b3c5bb2aeb2025-02-03T06:47:34ZengWileyIET Information Security1751-87091751-87172023-05-0117339440610.1049/ise2.12103Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systemsJunling Pei0Lusheng Chen1Chern Institute of Mathematics Nankai University Tianjin ChinaSchool of Mathematical Sciences Nankai University Tianjin ChinaAbstract In this paper, improved preimage attacks are presented on 3‐round Keccak‐256 and Keccak‐512 and 4‐round Keccak‐256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3‐round Keccak‐256 and Keccak‐512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 265 and 2440 to 264.79 and 2424, respectively. For preimage attack on 4‐round Keccak‐256, some strategies of saving degrees of freedom are applied to solve Boolean multivariate quadratic systems and reduce the guessing complexity from 2196 to 2188.https://doi.org/10.1049/ise2.12103algebraic systemcryptanalysisKeccak hash functionpreimage attack |
spellingShingle | Junling Pei Lusheng Chen Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems IET Information Security algebraic system cryptanalysis Keccak hash function preimage attack |
title | Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems |
title_full | Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems |
title_fullStr | Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems |
title_full_unstemmed | Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems |
title_short | Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems |
title_sort | preimage attacks on reduced round keccak hash functions by solving algebraic systems |
topic | algebraic system cryptanalysis Keccak hash function preimage attack |
url | https://doi.org/10.1049/ise2.12103 |
work_keys_str_mv | AT junlingpei preimageattacksonreducedroundkeccakhashfunctionsbysolvingalgebraicsystems AT lushengchen preimageattacksonreducedroundkeccakhashfunctionsbysolvingalgebraicsystems |