Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems

Abstract In this paper, improved preimage attacks are presented on 3‐round Keccak‐256 and Keccak‐512 and 4‐round Keccak‐256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the...

Full description

Saved in:
Bibliographic Details
Main Authors: Junling Pei, Lusheng Chen
Format: Article
Language:English
Published: Wiley 2023-05-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12103
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832546678581755904
author Junling Pei
Lusheng Chen
author_facet Junling Pei
Lusheng Chen
author_sort Junling Pei
collection DOAJ
description Abstract In this paper, improved preimage attacks are presented on 3‐round Keccak‐256 and Keccak‐512 and 4‐round Keccak‐256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3‐round Keccak‐256 and Keccak‐512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 265 and 2440 to 264.79 and 2424, respectively. For preimage attack on 4‐round Keccak‐256, some strategies of saving degrees of freedom are applied to solve Boolean multivariate quadratic systems and reduce the guessing complexity from 2196 to 2188.
format Article
id doaj-art-8f21096178f94d298ab636b3c5bb2aeb
institution Kabale University
issn 1751-8709
1751-8717
language English
publishDate 2023-05-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-8f21096178f94d298ab636b3c5bb2aeb2025-02-03T06:47:34ZengWileyIET Information Security1751-87091751-87172023-05-0117339440610.1049/ise2.12103Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systemsJunling Pei0Lusheng Chen1Chern Institute of Mathematics Nankai University Tianjin ChinaSchool of Mathematical Sciences Nankai University Tianjin ChinaAbstract In this paper, improved preimage attacks are presented on 3‐round Keccak‐256 and Keccak‐512 and 4‐round Keccak‐256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3‐round Keccak‐256 and Keccak‐512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 265 and 2440 to 264.79 and 2424, respectively. For preimage attack on 4‐round Keccak‐256, some strategies of saving degrees of freedom are applied to solve Boolean multivariate quadratic systems and reduce the guessing complexity from 2196 to 2188.https://doi.org/10.1049/ise2.12103algebraic systemcryptanalysisKeccak hash functionpreimage attack
spellingShingle Junling Pei
Lusheng Chen
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
IET Information Security
algebraic system
cryptanalysis
Keccak hash function
preimage attack
title Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
title_full Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
title_fullStr Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
title_full_unstemmed Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
title_short Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
title_sort preimage attacks on reduced round keccak hash functions by solving algebraic systems
topic algebraic system
cryptanalysis
Keccak hash function
preimage attack
url https://doi.org/10.1049/ise2.12103
work_keys_str_mv AT junlingpei preimageattacksonreducedroundkeccakhashfunctionsbysolvingalgebraicsystems
AT lushengchen preimageattacksonreducedroundkeccakhashfunctionsbysolvingalgebraicsystems