Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function

Itai Dinur*, Paweł Morawiecki, Josef Pieprzyk, Marian Srebrny, Michał Straus

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

44 Citations (Scopus)

Abstract

In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak) against algebraic attacks. This analysis covers a wide range of key recovery, MAC forgery and other types of attacks, breaking up to 9 rounds (out of the full 24) of the Keccak internal permutation much faster than exhaustive search. Moreover, some of our attacks on the 6-round Keccak are completely practical and were verified on a desktop PC. Our methods combine cube attacks (an algebraic key recovery attack) and related algebraic techniques with structural analysis of the Keccak permutation. These techniques should be useful in future cryptanalysis of Keccak and similar designs. Although our attacks break more rounds than previously published techniques, the security margin of Keccak remains large. For Keyak - the Keccak-based authenticated encryption scheme - the nominal number of rounds is 12 and therefore its security margin is smaller (although still sufficient).

Original languageEnglish
Title of host publicationAdvances in Cryptology – EUROCRYPT 2015
Subtitle of host publication34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings
EditorsElisabeth Oswald, Marc Fischlin
Place of PublicationHeidelberg
PublisherSpringer, Springer Nature
Pages733-761
Number of pages29
Volume9056
ISBN (Electronic)9783662468005
ISBN (Print)9783662467992
DOIs
Publication statusPublished - 2015
Externally publishedYes
Event34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2015 - Sofia, Bulgaria
Duration: 26 Apr 201530 Apr 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Berlin Heidelberg
Volume9056
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2015
CountryBulgaria
CitySofia
Period26/04/1530/04/15

Keywords

  • Cube attack
  • Keccak
  • SHA-3
  • Sponge function

Fingerprint Dive into the research topics of 'Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function'. Together they form a unique fingerprint.

Cite this