Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Abstract In this paper, improved preimage attacks are presented on 3‐round Keccak‐256 and Keccak‐512 and 4‐round Keccak‐256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the...
Saved in:
Main Authors: | Junling Pei, Lusheng Chen |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2023-05-01
|
Series: | IET Information Security |
Subjects: | |
Online Access: | https://doi.org/10.1049/ise2.12103 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
by: Jian ZOU, et al.
Published: (2013-06-01) -
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
by: Gao-li WANG, et al.
Published: (2014-02-01) -
Improved preimage and pseudo-collision attacks on SM3 hash function
by: Jian ZOU, et al.
Published: (2018-01-01) -
Research on differential properties of Keccak-like nonlinear transform
by: Qian-nan LI, et al.
Published: (2012-09-01) -
Improvement and evaluation for algebraic fault attacks on PRESENT
by: Jing HUANG, et al.
Published: (2016-08-01)