Abstract | ||
---|---|---|
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to distinguishing Keccak sponge function from random permutation. In EUROCRYPT'17, Huang et al. proposed conditional cube tester to recover the key of Keccak-MAC and Keyak and to construct practical distinguishing attacks on Keccak sponge function up to 7 rounds. In this paper, we improve the conditional cube tester model by refining the formulation of cube variables. By classifying cube variables into three different types and working the candidates of these types of cube variable carefully, we are able to establish a new theoretical distinguisher on 8-round Keccak sponge function. Our result is more efficient and greatly improves the existing results. Finally we remark that our distinguishing attack on the the reduced-round Keccak will not threat the security margin of the Keccak sponge function. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1587/transfun.E102.A.242 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES |
Keywords | Field | DocType |
Keccak sponge function, conditional cube tester, conditional cube variable, ordinary cube variable | Discrete mathematics,Arithmetic,Mathematics,Sponge function | Journal |
Volume | Issue | ISSN |
E102A | 1 | 1745-1337 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Senyang Huang | 1 | 7 | 0.82 |
Xiaoyun Wang | 2 | 2338 | 170.86 |
Guangwu Xu | 3 | 275 | 29.83 |
Meiqin Wang | 4 | 378 | 42.85 |
Jingyuan Zhao | 5 | 101 | 10.60 |