TY - GEN
T1 - Finding ordinary cube variables for Keccak-MAC with greedy algorithm
AU - Liu, Fukang
AU - Cao, Zhenfu
AU - Wang, Gaoli
N1 - Publisher Copyright:
© 2019, Springer Nature Switzerland AG.
PY - 2019
Y1 - 2019
N2 - In this paper, we introduce an alternative method to find ordinary cube variables for Keccak-MAC by making full use of the key-independent bit conditions. First, we select some potential candidates for ordinary cube variables by properly adding key-independent bit conditions, which do not multiply with the chosen conditional cube variables in the first two rounds. Then, we carefully determine the ordinary cube variables from the candidates to establish the conditional cube tester. Finally, based on our new method to recover the 128-bit key, the conditional cube attack on 7-round Keccak-MAC-128/256/384 is improved to 271 and 6-round Keccak-MAC-512 can be attacked with at most 240 calls to 6-round Keccak internal permutation. It should be emphasized that our new approach does not require sophisticated modeling. As far as we know, it is the first time to clearly reveal how to utilize the key-independent bit conditions to select ordinary cube variables for Keccak-MAC.
AB - In this paper, we introduce an alternative method to find ordinary cube variables for Keccak-MAC by making full use of the key-independent bit conditions. First, we select some potential candidates for ordinary cube variables by properly adding key-independent bit conditions, which do not multiply with the chosen conditional cube variables in the first two rounds. Then, we carefully determine the ordinary cube variables from the candidates to establish the conditional cube tester. Finally, based on our new method to recover the 128-bit key, the conditional cube attack on 7-round Keccak-MAC-128/256/384 is improved to 271 and 6-round Keccak-MAC-512 can be attacked with at most 240 calls to 6-round Keccak internal permutation. It should be emphasized that our new approach does not require sophisticated modeling. As far as we know, it is the first time to clearly reveal how to utilize the key-independent bit conditions to select ordinary cube variables for Keccak-MAC.
KW - Conditional cube attack
KW - Hash function
KW - Keccak
KW - Keccak-MAC
KW - Ordinary cube variables
UR - https://www.scopus.com/pages/publications/85071495602
U2 - 10.1007/978-3-030-26834-3_17
DO - 10.1007/978-3-030-26834-3_17
M3 - 会议稿件
AN - SCOPUS:85071495602
SN - 9783030268336
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 287
EP - 305
BT - Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Proceedings
A2 - Attrapadung, Nuttapong
A2 - Yagi, Takeshi
PB - Springer Verlag
T2 - 14th International Workshop on Security, IWSEC 2019
Y2 - 28 August 2019 through 30 August 2019
ER -