TY - JOUR
T1 - Exploiting output bits and the χ operation in MitM preimage attacks on Keccak
AU - Weng, Tianling
AU - Wang, Gaoli
AU - Jia, Keting
AU - Dong, Xiaoyang
AU - Sun, Siwei
AU - Cui, Tingting
N1 - Publisher Copyright:
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.
PY - 2025/11
Y1 - 2025/11
N2 - Keccak, the cryptographic hash function at the core of the SHA-3 standard, offers enhanced security and efficiency for data integrity and authentication. Qin et al. (EUROCRYPT 2023) first introduced a Meet-in-the-Middle (MitM) preimage attack on Keccak using a Mixed-Integer Linear Programming (MILP) model. In this paper, we further analyze Keccak’s security against this MitM preimage attack. In Qin’s work, the model relied only on the digest portion of Keccak’s output to find match points, though the digest represents only part of the full output. Our improved MILP model expands on this by incorporating both the digest and additional selected bits from the remaining output of Keccak. Additionally, we exploit the properties of theχ operation to optimize the model further. This new model increases the number of match points in MitM attacks and effectively reduces time complexity. Applying it to Keccak-384 and Keccak-512, we achieve the best-known results for 4-round Keccak-512, with a time complexity of 2502.8 and memory complexity of 279. Moreover, We present the first MitM preimage attack on weak digests for Keccak-384 and Keccak-512, where “weak digests” refers to digests that are more vulnerable to efficient attacks compared to others. For 4-round Keccak-512, the attack has a time complexity of 2491 and memory complexity of 268. Since we fix the values of 57 bits in the digest, this attack is effective for 2455 digests. For 4-round Keccak-384, it achieves a time complexity of 2376.1 and memory complexity of 273. Since we fix the values of 12 bits in the digest, this attack is effective for 2372 digests.
AB - Keccak, the cryptographic hash function at the core of the SHA-3 standard, offers enhanced security and efficiency for data integrity and authentication. Qin et al. (EUROCRYPT 2023) first introduced a Meet-in-the-Middle (MitM) preimage attack on Keccak using a Mixed-Integer Linear Programming (MILP) model. In this paper, we further analyze Keccak’s security against this MitM preimage attack. In Qin’s work, the model relied only on the digest portion of Keccak’s output to find match points, though the digest represents only part of the full output. Our improved MILP model expands on this by incorporating both the digest and additional selected bits from the remaining output of Keccak. Additionally, we exploit the properties of theχ operation to optimize the model further. This new model increases the number of match points in MitM attacks and effectively reduces time complexity. Applying it to Keccak-384 and Keccak-512, we achieve the best-known results for 4-round Keccak-512, with a time complexity of 2502.8 and memory complexity of 279. Moreover, We present the first MitM preimage attack on weak digests for Keccak-384 and Keccak-512, where “weak digests” refers to digests that are more vulnerable to efficient attacks compared to others. For 4-round Keccak-512, the attack has a time complexity of 2491 and memory complexity of 268. Since we fix the values of 57 bits in the digest, this attack is effective for 2455 digests. For 4-round Keccak-384, it achieves a time complexity of 2376.1 and memory complexity of 273. Since we fix the values of 12 bits in the digest, this attack is effective for 2372 digests.
KW - Keccak
KW - MILP
KW - Meet-in-the-Middle
KW - Preimage attack
UR - https://www.scopus.com/pages/publications/105012857498
U2 - 10.1007/s10623-025-01703-y
DO - 10.1007/s10623-025-01703-y
M3 - 文章
AN - SCOPUS:105012857498
SN - 0925-1022
VL - 93
SP - 4887
EP - 4909
JO - Designs, Codes, and Cryptography
JF - Designs, Codes, and Cryptography
IS - 11
ER -