首页> 外文会议>Annual international conference on the theory and applications of cryptographic techniques >Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
【24h】

Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function

机译:圆攻击减少的Keccak海绵功能的多维数据集攻击和类似于多维数据集的攻击密码分析

获取原文

摘要

In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak) against algebraic attacks. This analysis covers a wide range of key recovery, MAC forgery and other types of attacks, breaking up to 9 rounds (out of the full 24) of the Keccak internal permutation much faster than exhaustive search. Moreover, some of our attacks on the 6-round Keccak are completely practical and were verified on a desktop PC. Our methods combine cube attacks (an algebraic key recovery attack) and related algebraic techniques with structural analysis of the Keccak permutation. These techniques should be useful in future cryptanalysis of Keccak and similar designs. Although our attacks break more rounds than previously published techniques, the security margin of Keccak remains large. For Keyak - the Keccak-based authenticated encryption scheme - the nominal number of rounds is 12 and therefore its security margin is smaller (although still sufficient).
机译:在本文中,我们全面研究了SHA-3的关键变体(Keccak)对代数攻击的抵抗力。此分析涵盖了广泛的密钥恢复,MAC伪造和其他类型的攻击,与详尽搜索相比,最多可对多达9轮(总共24轮)的Keccak内部排列进行分解。此外,我们对6轮Keccak的一些攻击是完全可行的,并已在台式PC上得到验证。我们的方法将立方攻击(代数密钥恢复攻击)和相关代数技术与Keccak置换的结构分析相结合。这些技术在以后的Keccak和类似设计的密码分析中应该很有用。尽管我们的攻击比以前发布的技术多发几回合,但Keccak的安全性仍然很大。对于Keyak(基于Keccak的身份验证加密方案),名义轮数为12,因此其安全裕度较小(尽管仍然足够)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号