A SAT-based preimage analysis of reduced Keccak hash functions

In this paper, we present a preimage attack on reduced versions of Keccak hash functions. We use our recently developed toolkit CryptLogVer for generating the conjunctive normal form, CNF, which is passed to the SAT solver PrecoSAT. We found preimages for some reduced versions of the function and sh...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Information processing letters 2013-05, Vol.113 (10-11), p.392-397
Hauptverfasser: Morawiecki, Paweł, Srebrny, Marian
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 397
container_issue 10-11
container_start_page 392
container_title Information processing letters
container_volume 113
creator Morawiecki, Paweł
Srebrny, Marian
description In this paper, we present a preimage attack on reduced versions of Keccak hash functions. We use our recently developed toolkit CryptLogVer for generating the conjunctive normal form, CNF, which is passed to the SAT solver PrecoSAT. We found preimages for some reduced versions of the function and showed that full Keccak function has a comfortable security margin against this kind of attack. •We have carried out the SAT-based preimage attack on reduced Keccak hash function.•We have found a preimage and partial preimages for reduced versions of Keccak hash function.•The results suggest the strength of the Keccak function against the SAT-based attack.
doi_str_mv 10.1016/j.ipl.2013.03.004
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1322102073</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0020019013000811</els_id><sourcerecordid>2932694891</sourcerecordid><originalsourceid>FETCH-LOGICAL-c325t-7e34c93b7c6635a56331d0f7d30230ef124d4f79f54332c6977bce8738d445cc3</originalsourceid><addsrcrecordid>eNp9UE1LAzEUDKJg_fgB3hY8b33Jy266CEIpfmHBg_Uc0uyLzVp312RX6L83pZ6FgTm8mcfMMHbFYcqBlzfN1PfbqQCOU0gAecQmfKZEXnJeHbMJgIAceAWn7CzGBgBKiWrC7ubZ23yVr02kOusD-S_zQZlpzXYXfcw6lwWqR5uOL2St-cw2Jm4yN7Z28F0bL9iJM9tIl398zt4f7leLp3z5-vi8mC9zi6IYckUobYVrZcsSC1OUiLwGp2oEgUCOC1lLpypXSERhy0qptaWZwlktZWEtnrPrw98-dN8jxUE33RhSyqg5CsFTO4VJxQ8qG7oYAzndh1Qo7DQHvZ9JNzrNpPczaUgAmTy3Bw-l-D-ego7WU5sa-0B20HXn_3H_Au51bWg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1322102073</pqid></control><display><type>article</type><title>A SAT-based preimage analysis of reduced Keccak hash functions</title><source>Elsevier ScienceDirect Journals Complete - AutoHoldings</source><creator>Morawiecki, Paweł ; Srebrny, Marian</creator><creatorcontrib>Morawiecki, Paweł ; Srebrny, Marian</creatorcontrib><description>In this paper, we present a preimage attack on reduced versions of Keccak hash functions. We use our recently developed toolkit CryptLogVer for generating the conjunctive normal form, CNF, which is passed to the SAT solver PrecoSAT. We found preimages for some reduced versions of the function and showed that full Keccak function has a comfortable security margin against this kind of attack. •We have carried out the SAT-based preimage attack on reduced Keccak hash function.•We have found a preimage and partial preimages for reduced versions of Keccak hash function.•The results suggest the strength of the Keccak function against the SAT-based attack.</description><identifier>ISSN: 0020-0190</identifier><identifier>EISSN: 1872-6119</identifier><identifier>DOI: 10.1016/j.ipl.2013.03.004</identifier><identifier>CODEN: IFPLAT</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Algebraic cryptanalysis ; Cryptography ; Data encryption ; Hash functions ; Keccak ; Logical cryptanalysis ; Mathematical functions ; SAT solvers ; Security management ; Studies</subject><ispartof>Information processing letters, 2013-05, Vol.113 (10-11), p.392-397</ispartof><rights>2013 Elsevier B.V.</rights><rights>Copyright Elsevier Sequoia S.A. May/Jun 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c325t-7e34c93b7c6635a56331d0f7d30230ef124d4f79f54332c6977bce8738d445cc3</citedby><cites>FETCH-LOGICAL-c325t-7e34c93b7c6635a56331d0f7d30230ef124d4f79f54332c6977bce8738d445cc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.ipl.2013.03.004$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3549,27923,27924,45994</link.rule.ids></links><search><creatorcontrib>Morawiecki, Paweł</creatorcontrib><creatorcontrib>Srebrny, Marian</creatorcontrib><title>A SAT-based preimage analysis of reduced Keccak hash functions</title><title>Information processing letters</title><description>In this paper, we present a preimage attack on reduced versions of Keccak hash functions. We use our recently developed toolkit CryptLogVer for generating the conjunctive normal form, CNF, which is passed to the SAT solver PrecoSAT. We found preimages for some reduced versions of the function and showed that full Keccak function has a comfortable security margin against this kind of attack. •We have carried out the SAT-based preimage attack on reduced Keccak hash function.•We have found a preimage and partial preimages for reduced versions of Keccak hash function.•The results suggest the strength of the Keccak function against the SAT-based attack.</description><subject>Algebraic cryptanalysis</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Hash functions</subject><subject>Keccak</subject><subject>Logical cryptanalysis</subject><subject>Mathematical functions</subject><subject>SAT solvers</subject><subject>Security management</subject><subject>Studies</subject><issn>0020-0190</issn><issn>1872-6119</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNp9UE1LAzEUDKJg_fgB3hY8b33Jy266CEIpfmHBg_Uc0uyLzVp312RX6L83pZ6FgTm8mcfMMHbFYcqBlzfN1PfbqQCOU0gAecQmfKZEXnJeHbMJgIAceAWn7CzGBgBKiWrC7ubZ23yVr02kOusD-S_zQZlpzXYXfcw6lwWqR5uOL2St-cw2Jm4yN7Z28F0bL9iJM9tIl398zt4f7leLp3z5-vi8mC9zi6IYckUobYVrZcsSC1OUiLwGp2oEgUCOC1lLpypXSERhy0qptaWZwlktZWEtnrPrw98-dN8jxUE33RhSyqg5CsFTO4VJxQ8qG7oYAzndh1Qo7DQHvZ9JNzrNpPczaUgAmTy3Bw-l-D-ego7WU5sa-0B20HXn_3H_Au51bWg</recordid><startdate>20130501</startdate><enddate>20130501</enddate><creator>Morawiecki, Paweł</creator><creator>Srebrny, Marian</creator><general>Elsevier B.V</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20130501</creationdate><title>A SAT-based preimage analysis of reduced Keccak hash functions</title><author>Morawiecki, Paweł ; Srebrny, Marian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c325t-7e34c93b7c6635a56331d0f7d30230ef124d4f79f54332c6977bce8738d445cc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Algebraic cryptanalysis</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Hash functions</topic><topic>Keccak</topic><topic>Logical cryptanalysis</topic><topic>Mathematical functions</topic><topic>SAT solvers</topic><topic>Security management</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Morawiecki, Paweł</creatorcontrib><creatorcontrib>Srebrny, Marian</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Information processing letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Morawiecki, Paweł</au><au>Srebrny, Marian</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A SAT-based preimage analysis of reduced Keccak hash functions</atitle><jtitle>Information processing letters</jtitle><date>2013-05-01</date><risdate>2013</risdate><volume>113</volume><issue>10-11</issue><spage>392</spage><epage>397</epage><pages>392-397</pages><issn>0020-0190</issn><eissn>1872-6119</eissn><coden>IFPLAT</coden><abstract>In this paper, we present a preimage attack on reduced versions of Keccak hash functions. We use our recently developed toolkit CryptLogVer for generating the conjunctive normal form, CNF, which is passed to the SAT solver PrecoSAT. We found preimages for some reduced versions of the function and showed that full Keccak function has a comfortable security margin against this kind of attack. •We have carried out the SAT-based preimage attack on reduced Keccak hash function.•We have found a preimage and partial preimages for reduced versions of Keccak hash function.•The results suggest the strength of the Keccak function against the SAT-based attack.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.ipl.2013.03.004</doi><tpages>6</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0020-0190
ispartof Information processing letters, 2013-05, Vol.113 (10-11), p.392-397
issn 0020-0190
1872-6119
language eng
recordid cdi_proquest_journals_1322102073
source Elsevier ScienceDirect Journals Complete - AutoHoldings
subjects Algebraic cryptanalysis
Cryptography
Data encryption
Hash functions
Keccak
Logical cryptanalysis
Mathematical functions
SAT solvers
Security management
Studies
title A SAT-based preimage analysis of reduced Keccak hash functions
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T06%3A33%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20SAT-based%20preimage%20analysis%20of%20reduced%20Keccak%20hash%20functions&rft.jtitle=Information%20processing%20letters&rft.au=Morawiecki,%20Pawe%C5%82&rft.date=2013-05-01&rft.volume=113&rft.issue=10-11&rft.spage=392&rft.epage=397&rft.pages=392-397&rft.issn=0020-0190&rft.eissn=1872-6119&rft.coden=IFPLAT&rft_id=info:doi/10.1016/j.ipl.2013.03.004&rft_dat=%3Cproquest_cross%3E2932694891%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1322102073&rft_id=info:pmid/&rft_els_id=S0020019013000811&rfr_iscdi=true