Sciweavers

IACR
2011

Unaligned Rebound Attack - Application to Keccak

12 years 4 months ago
Unaligned Rebound Attack - Application to Keccak
We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we are able to derive most of the best known differential paths for up to 5 rounds. We use these differential paths in a rebound attack setting and adapt this powerful freedom degrees utilization in order to derive distinguishers for up to 8 rounds of the internal permutations of the submitted
Alexandre Duc, Jian Guo 0001, Thomas Peyrin, Lei W
Added 23 Dec 2011
Updated 23 Dec 2011
Type Journal
Year 2011
Where IACR
Authors Alexandre Duc, Jian Guo 0001, Thomas Peyrin, Lei Wei
Comments (0)