Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems

Abstract In this paper, improved preimage attacks are presented on 3‐round Keccak‐256 and Keccak‐512 and 4‐round Keccak‐256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the...

Full description

Saved in:
Bibliographic Details
Main Authors: Junling Pei, Lusheng Chen
Format: Article
Language:English
Published: Wiley 2023-05-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12103
Tags: Add Tag
No Tags, Be the first to tag this record!