Authors
Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao
Publication date
2019/1/1
Journal
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Volume
102
Issue
1
Pages
242-250
Publisher
The Institute of Electronics, Information and Communication Engineers
Description
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to distinguishing Keccak sponge function from random permutation. In EUROCRYPT'17, Huang et al. proposed conditional cube tester to recover the key of Keccak-MAC and Keyak and to construct practical distinguishing attacks on Keccak sponge function up to 7 rounds. In this paper, we improve the conditional cube tester model by refining the formulation of cube variables. By classifying cube variables into three different types and working the candidates of these types of cube variable carefully, we are able to establish a new theoretical distinguisher on 8-round Keccak sponge function. Our result is more efficient and greatly improves the existing results. Finally we remark that our distinguishing attack on the the reduced-round Keccak will not threat the security margin of the Keccak …
Total citations
2020202120222023211
Scholar articles
S Huang, X Wang, G Xu, M Wang, J Zhao - IEICE Transactions on Fundamentals of Electronics …, 2019