Exploiting output bits and the $$\chi $$ operation in MitM preimage attacks on Keccak

  • Abstract
  • Literature Map
  • References
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

Exploiting output bits and the $$\chi $$ operation in MitM preimage attacks on Keccak

ReferencesShowing 10 of 19 papers
  • Open Access Icon
  • Cite Count Icon 15
  • 10.1007/978-3-031-30634-1_6
Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing
  • Jan 1, 2023
  • Lingyue Qin + 4 more

  • Open Access Icon
  • PDF Download Icon
  • Cite Count Icon 10
  • 10.46586/tosc.v2021.i1.217-238
Improved Preimage Attacks on 4-Round Keccak-224/256
  • Mar 19, 2021
  • IACR Transactions on Symmetric Cryptology
  • Le He + 2 more

  • Open Access Icon
  • PDF Download Icon
  • Cite Count Icon 3
  • 10.46586/tosc.v2021.i1.239-268
Algebraic Collision Attacks on Keccak
  • Mar 19, 2021
  • IACR Transactions on Symmetric Cryptology
  • Rachelle Heim Boissier + 2 more

  • Cite Count Icon 45
  • 10.1007/978-3-662-53887-6_9
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
  • Jan 1, 2016
  • Jian Guo + 2 more

  • Open Access Icon
  • Cite Count Icon 5
  • 10.1007/978-3-031-30634-1_8
Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials
  • Jan 1, 2023
  • Zhongyi Zhang + 2 more

  • Open Access Icon
  • PDF Download Icon
  • Cite Count Icon 6
  • 10.46586/tosc.v2021.i3.84-101
Improved Preimage Attacks on 3-Round Keccak-224/256
  • Sep 17, 2021
  • IACR Transactions on Symmetric Cryptology
  • Xiaoen Lin + 2 more

  • Open Access Icon
  • Cite Count Icon 1177
  • 10.1007/11426639_2
How to Break MD5 and Other Hash Functions
  • Jan 1, 2005
  • Xiaoyun Wang + 1 more

  • Open Access Icon
  • PDF Download Icon
  • Cite Count Icon 5
  • 10.46586/tosc.v2022.i3.239-270
Finding Collisions against 4-Round SHA-3-384 in Practical Time
  • Sep 9, 2022
  • IACR Transactions on Symmetric Cryptology
  • Senyang Huang + 3 more

  • Cite Count Icon 6
  • 10.13154/tosc.v2017.i4.39-57
Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures
  • Dec 15, 2017
  • Ting Li + 3 more

  • Open Access Icon
  • Cite Count Icon 22
  • 10.1007/978-3-030-77870-5_27
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
  • Jan 1, 2021
  • Zhenzhen Bao + 6 more

Similar Papers
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 10
  • 10.46586/tosc.v2021.i1.217-238
Improved Preimage Attacks on 4-Round Keccak-224/256
  • Mar 19, 2021
  • IACR Transactions on Symmetric Cryptology
  • Le He + 2 more

This paper provides an improved preimage attack method on standard 4-round Keccak-224/256. The method is based on the work pioneered by Li and Sun, who design a linear structure of 2-round Keccak-224/256 with 194 degrees of freedom left. By partially linearizing 17 output bits through the last 2 rounds, they finally reach a complexity of 2207/2239 for searching a 4-round preimage. Yet under their strategy, those 17 bits are regarded as independent bits and the linearization costs a great amount of freedom. Inspired by their thoughts, we improve the partial linearization method where multiple output bits can reuse some common degrees of freedom. As a result, the complexity of preimage attack on 4-round Keccak-224/256 can be decreased to 2192/2218, which are both the best known theoretical preimage cryptanalysis so far. To support the theoretical analysis, we apply our strategy to a 64-bit partial preimage attack within practical complexity. It is remarkable that this partial linearization method can be directly applied if a better linear structure with more freedom left is proposed.

  • Book Chapter
  • Cite Count Icon 45
  • 10.1007/978-3-662-53887-6_9
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
  • Jan 1, 2016
  • Jian Guo + 2 more

In this paper, we analyze the security of round-reduced versions of the Keccak hash function family. Based on the work pioneered by Aumasson and Meier, and Dinur et al., we formalize and develop a technique named linear structure, which allows linearization of the underlying permutation of Keccak for up to 3 rounds with large number of variable spaces. As a direct application, it extends the best zero-sum distinguishers by 2 rounds without increasing the complexities. We also apply linear structures to preimage attacks against Keccak. By carefully studying the properties of the underlying Sbox, we show bilinear structures and find ways to convert the information on the output bits to linear functions on input bits. These findings, combined with linear structures, lead us to preimage attacks against up to 4-round Keccak with reduced complexities. An interesting feature of such preimage attacks is low complexities for small variants. As extreme examples, we can now find preimages of 3-round SHAKE128 with complexity 1, as well as the first practical solutions to two 3-round instances of Keccak challenge. Both zero-sum distinguishers and preimage attacks are verified by implementations. It is noted that the attacks here are still far from threatening the security of the full 24-round Keccak.

  • Research Article
  • Cite Count Icon 1
  • 10.1049/iet-ifs.2012.0035
New multivariate hash function quadratic polynomials multiplying linear polynomials
  • Sep 1, 2013
  • IET Information Security
  • Youjiao Zou + 3 more

In this study the authors propose a new multivariate hash function with HAsh Iterative FrAmework framework which we call the hash function quadratic polynomials multiplying linear polynomials (QML). The new hash function is made of cubic polynomials which are the products of quadratic polynomials and linear polynomials. The authors design the quadratic-polynomial part of the compression function based on the centre map of the multivariate public key cryptosystem Matsumoto-Imai cryptosystem (MI). The hash function QML can keep the three cryptography properties and be immune to the pre-image attack, second pre-image attack, collision attack, differential attack and algebraic attack. The required memory storage is about 50% of the one which is built of the cubic polynomials and their coefficients are random. On the avalanche effect, by experiments the authors get the result that about one half of the output bits are different when one input bit is changed randomly. The one-round diffusion of the hash function QML is twice of that of Blake. Also the authors simplify the matrixes of the new hash function, analyse the rationality and show the comparable data. Finally, the authors give the advice to the parameters of the new hash function and summarise the paper.

More from: Designs, Codes and Cryptography
  • Research Article
  • 10.1007/s10623-025-01734-5
Correction: Linearity of $$\mathbb {Z}_{2^L}$$-linear codes via Schur product
  • Oct 4, 2025
  • Designs, Codes and Cryptography
  • Gustavo T Bastos + 3 more

  • Research Article
  • 10.1007/s10623-025-01728-3
Ryser’s theorem for simple multi-Latin rectangles
  • Oct 2, 2025
  • Designs, Codes and Cryptography
  • Amin Bahmanian

  • Research Article
  • 10.1007/s10623-025-01730-9
Correction: On flag-transitive symmetric (v, k, 4) designs
  • Sep 28, 2025
  • Designs, Codes and Cryptography
  • Seyed Hassan Alavi

  • Research Article
  • 10.1007/s10623-025-01668-y
New constructions of cyclic constant-dimension subspace codes based on Sidon spaces and subspace polynomials
  • Sep 19, 2025
  • Designs, Codes and Cryptography
  • Gang Wang + 2 more

  • Research Article
  • 10.1007/s10623-025-01713-w
Linearity of $$\mathbb {Z}_{2^L}$$-linear codes via Schur product
  • Aug 31, 2025
  • Designs, Codes and Cryptography
  • Gustavo T Bastos + 3 more

  • Research Article
  • 10.1007/s10623-025-01712-x
More on the sum-freedom of the multiplicative inverse function
  • Aug 14, 2025
  • Designs, Codes and Cryptography
  • Claude Carlet + 1 more

  • Research Article
  • 10.1007/s10623-025-01711-y
Generalizing the Bierbrauer–Friedman bound for orthogonal arrays
  • Aug 13, 2025
  • Designs, Codes and Cryptography
  • Denis S Krotov + 2 more

  • Research Article
  • 10.1007/s10623-025-01708-7
Determining the weight spectrum of the Reed–Muller codes $$RM(m-6,m)$$
  • Aug 8, 2025
  • Designs, Codes and Cryptography
  • Yueying Lou + 1 more

  • Research Article
  • 10.1007/s10623-025-01703-y
Exploiting output bits and the $$\chi $$ operation in MitM preimage attacks on Keccak
  • Aug 7, 2025
  • Designs, Codes and Cryptography
  • Tianling Weng + 5 more

  • Research Article
  • 10.1007/s10623-025-01707-8
Galois LCD subspace codes
  • Aug 7, 2025
  • Designs, Codes and Cryptography
  • Jie Liu + 2 more

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.

Search IconWhat is the difference between bacteria and viruses?
Open In New Tab Icon
Search IconWhat is the function of the immune system?
Open In New Tab Icon
Search IconCan diabetes be passed down from one generation to the next?
Open In New Tab Icon