Abstract - Keccak is a winning hash function in the SHA-3 competition. This study will focus on analyzing and detailing some of the cryptographic properties of the constituent composition changes, permutating Keccak-p in the hash function Keccak. Specifically, a detailed argument will be given for the number of branches of linear transformation in the loop function of Keccak-p permutation and considering the dependency between input and output bits in this loop function. On the other hand, also gives some analysis of Keccak's installation ability based on these component changes.
Xem toàn bộ bài báo tại đây.
TÀI LIỆU THAM KHẢO 1. Damgård, I.B. “A design principle for hash functions. in Advances in Cryptology—CRYPTO’89 Proceedings”. Springer, 1989. 2. Merkle, R.C. “One way hash functions and DES. in Advances in Cryptology”—CRYPTO’89 Proceedings, Springer, 1989. 3. Guido, B., et al., “Cryptographic sponge functions”. 2011. О. and М. “Иванов, Стардарт криптографической защиты-AES”. Конечные поля, КУДРИЦ-ОБРАЗ М, 2002. 5. NIST, SHA-3 Stadard: “Permutation-Based Hash And Extendable Output Functions”. 8/2015. 6. Bertoni, G., et al., “The Keccak reference, version 3.0”, URL:http://keccak.noekeon.org/Keccakreference-3.0.pdf. Citations in this document. 4, 2011. |
Thông tin trích dẫn : Nguyễn Văn Long, " Phân tích các thành phần mật mã trong hoán vị Keccak-p ", Nghiên cứu Khoa học và Công nghệ trong lĩnh vực An toàn thông tin, Tạp chí An toàn thông tin, Vol. 08, pp. 34-44, No. 02, 2018.