Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]

Abstract: Recently, linear structures and algebraic attacks have been widely used in preimage attacks on round-reduced Keccak. Inherited by pioneers’ work, we make some improvements for 3-round Keccak-256 and 4-round Keccak[r=640, c=160]. For 3-round Keccak-256, we introduce a three-stage model to deal with the unsatisfied restrictions while bringing more degrees of freedom at the same time. Besides, we show that guessing values for different variables will result in different complexity of solving time. With these techniques, the guessing times can be decreased to 252, and the solving time for each guess can be decreased to around 25.2 3-round Keccak calls. As a result, the complexity of finding a preimage for 3-round Keccak-256 can be decreased to around 257.2. For 4-round Keccak[r=640, c=160], an instance of the Crunchy Contest, we use some techniques to save degrees of freedom and make better linearization. Based on these techniques, we build an MILP model and obtain an attack with bette.... https://tosc.iacr.org/index.php/ToSC/article/view/12079

Location
Deutsche Nationalbibliothek Frankfurt am Main
Extent
Online-Ressource
Language
Englisch

Bibliographic citation
Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160] ; volume:2025 ; number:1 ; year:2025
IACR transactions on symmetric cryptology ; 2025, Heft 1 (2025)

Creator
Lin, Xiaoen
He, Le
Yu, Hongbo

DOI
10.46586/tosc.v2025.i1.328-356
URN
urn:nbn:de:101:1-2503121755430.477755623294
Rights
Open Access; Der Zugriff auf das Objekt ist unbeschränkt möglich.
Last update
15.08.2025, 7:26 AM CEST

Data provider

This object is provided by:
Deutsche Nationalbibliothek. If you have any questions about the object, please contact the data provider.

Associated

  • Lin, Xiaoen
  • He, Le
  • Yu, Hongbo

Other Objects (12)