Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/100424
Title: Practical collision attacks against round-reduced SHA-3
Authors: Guo, Jian
Liao, Guohong
Liu, Guozhen
Liu, Meicheng
Qiao, Kexin
Song, Ling
Keywords: Cryptanalysis
Hash Function
Science::Mathematics::Discrete mathematics::Cryptography
Issue Date: 2019
Source: Guo, J., Liao, G., Liu, G., Liu, M., Qiao, K., & Song, L. Practical collision attacks against round-reduced SHA-3. Journal of Cryptology, 33, 228-270. doi:10.1007/s00145-019-09313-3
Journal: Journal of Cryptology
Series/Report no.: Journal of Cryptology
Abstract: The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 standard of NIST in 2015. In this paper, we focus on practical collision attacks against round-reduced SHA-3 and some Keccak variants. Following the framework developed by Dinur et al. at FSE 2012 where 4-round collisions were found by combining 3-round differential trails and 1-round connectors, we extend the connectors to up to three rounds and hence achieve collision attacks for up to 6 rounds. The extension is possible thanks to the large degree of freedom of the wide internal state. By linearizing S-boxes of the first round, the problem of finding solutions of 2-round connectors is converted to that of solving a system of linear equations. When linearization is applied to the first two rounds, 3-round connectors become possible. However, due to the quick reduction in the degree of freedom caused by linearization, the connector succeeds only when the 3-round differential trails satisfy some additional conditions. We develop dedicated strategies for searching differential trails and find that such special differential trails indeed exist. To summarize, we obtain the first real collisions on six instances, including three round-reduced instances of SHA-3, namely 5-round SHAKE128, SHA3-224 and SHA3-256, and three instances of Keccak contest, namely Keccak[1440, 160, 5, 160], Keccak[640, 160, 5, 160] and Keccak[1440, 160, 6, 160], improving the number of practically attacked rounds by two. It is remarked that the work here is still far from threatening the security of the full 24-round SHA-3 family.
URI: https://hdl.handle.net/10356/100424
http://hdl.handle.net/10220/49481
ISSN: 0933-2790
DOI: 10.1007/s00145-019-09313-3
Schools: School of Physical and Mathematical Sciences 
Organisations: Strategic Centre for Research in Privacy-Preserving Technologies and Systems
Rights: © 2019 International Association for Cryptologic Research. All rights reserved. This paper was published in Journal of Cryptology and is made available with permission of International Association for Cryptologic Research.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SPMS Journal Articles

Files in This Item:
File Description SizeFormat 
Practical collision attacks against round-reduced SHA-3.pdf418.12 kBAdobe PDFThumbnail
View/Open

SCOPUSTM   
Citations 20

33
Updated on Mar 22, 2025

Web of ScienceTM
Citations 20

17
Updated on Oct 27, 2023

Page view(s)

471
Updated on Mar 28, 2025

Download(s) 20

314
Updated on Mar 28, 2025

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.