Font Size: a A A

Conditional Cube Attack On Reduced-Round Keccak Sponge Function

Posted on:2018-01-03Degree:DoctorType:Dissertation
Country:ChinaCandidate:S Y HuangFull Text:PDF
GTID:1368330596466639Subject:Mathematics
Abstract/Summary:PDF Full Text Request
Nowadays,with the rapid development of computers and the widely use of inter-net,there is a huge amount of data transferred in the channel.To insure the security and reliability of the data becomes an important issue.To solve this issue,symmet-ric cryptographic primitives are an efficient method.Symmetric cryptography,which attracts the attention of academic community,is to study the security of symmetric cryptographic primitives.As the key technology of symmetric cryptography,hash function is applied to insure data integrity and confidentiality during the information communication.The security analysis of Keccak,the winner of SHA-3,is a standard hash function.It has attracted considerable interest.Based on the diffusion property of Keccak sponge function,we proposed a new cryptanalysis model–conditional cube tester in this paper.By imposing some bit conditions for certain ordinary cube variables,we are able to construct cube testers with smaller dimensions so that we reduce the complexity of several attacks.In this paper,we apply our conditional cube attack to analyse the security of t-wo different modes of Keccak sponge functions.And we get three different results.Among them,there are two results related to the key mode of Keccak sponge func-tion.Firstly,we improve the best key recovery attack proposed by Itai et al.In our results,time complexity of 6-round Keccak-MAC key recovery attack is reduced to 240from 265and memory complexity is negligible,which makes the attack a practical one.Time complexity of 7-round Keccak-MAC key recovery attack is decreased from 297to 272.Then,we also apply our conditional cube attack to an Authenticated Encryption Scheme Keyak based on Keccak.Our attack can analyse Keyak to 8-round but the previous best result is 7-round.Our third result in this paper is to construct some more efficient distinguishers on Keccak sponge function.The distinguishers can distinguish Keccak sponge function from random permutation.We provide a searching algorithm to produce the most effi-cient conditional cube tester by modeling it as an MILP?mixed integer linear program-ming?problem.As a result,we improve the previous distinguishing attacks on Keccak sponge function significantly.We get a 7-round distinguishing attack with complexi-ty of 233,which improves the 7-round distinguishing attack proposed by Itai et al.in Eurocrypt'15 with complexity of 265.Most of our attacks have been implemented and verified by desktop computers.
Keywords/Search Tags:Symmetric key cryptography, keccak sponge function, conditional cube tester, conditional cube variable, ordinary cube variable, diffusion
PDF Full Text Request
Related items