Cryptanalysis of 1-round KECCAK

Rajendra Kumar, Mahesh Sreekumar Rajasree, Hoda AlKhzaimi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we give the first pre-image attack against 1-round KECCAK-512 hash function, which works for all variants of 1-round KECCAK. The attack gives a preimage of length less than 1024 bits by solving a system of 384 linear equations. We also give a collision attack against 1-round KECCAK using similar analysis.

Original languageEnglish (US)
Title of host publicationProgress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings
EditorsAbderrahmane Nitaj, Tajjeeddine Rachidi, Antoine Joux
PublisherSpringer Verlag
Pages124-137
Number of pages14
ISBN (Print)9783319893389
DOIs
StatePublished - 2018
Event10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018 - Marrakesh, Morocco
Duration: May 7 2018May 9 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10831 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018
Country/TerritoryMorocco
CityMarrakesh
Period5/7/185/9/18

Keywords

  • Collision
  • Cryptanalysis
  • KECCAK
  • Preimage
  • SHA-3

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Cryptanalysis of 1-round KECCAK'. Together they form a unique fingerprint.

Cite this