Overview
Syllabus
Intro
KECCAK hash functions
Inner collision attack on the sponge mode
General description of the attack
Summary of our results
Abstract
Research problem
Related work
Methodology
Outline
Round Function of Keccak-f
Frame of Linear Analysis
Improvement of Old Strategy
Freedom Reuse Strategy
Improved Preimage Attack
Zero Coefficient
Bit Recovery
Freedom Return
Analysis Results
Frame of Preimage Attack
Motivation
Hirose's Compression Function (HCF)
Finding Collisions on HCF
Generic Classical Methods to Find Collisions
Generic Quantum Methods to Find Collisions
Rebound Attack Assumption
Classical Rebound Attack to Find Collisions
New Differential Trail for 10-round AES-256
Quantum Collision Attack on 10-Round HCF-AES-256
Summary of Our Attacks on HCF-AES-256
Conclusion and Future Works
Grover's Algorithm
Super S-box Cryptanalysis Gilbert and Peyrin (4)
Rebound Attack by Mendel et al. 3 at FSE 2009.
Collision attack on 9-round Simpira-2
(Quantum) Collision attack on 11-round Simpira-4
Collision Attacks on Other Variants of Simpira-4
Summary of the results for Simpira v2
Taught by
TheIACR