@inproceedings{0d4c5811555d4effa54a037de90321e7,
title = "Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials",
abstract = "On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standard. In this paper we present the first published collision finding attacks on reduced-round versions of Keccak-384 and Keccak-512, providing actual collisions for 3-round versions, and describing an attack which is 245 times faster than birthday attacks for 4-round Keccak-384. For Keccak-256, we increase the number of rounds which can be attacked to 5. All these results are based on a generalized internal differential attack (introduced by Peyrin at Crypto 2010), and use it to map a large number of Keccak inputs into a relatively small subset of possible outputs with a surprisingly large probability. In such a squeeze attack it is easier to find random collisions in the reduced target subset by a standard birthday argument.",
keywords = "Collisions, Cryptanalysis, Hash function, Internal differentials, Keccak, SHA-3, Squeeze attack",
author = "Itai Dinur and Orr Dunkelman and Adi Shamir",
note = "Funding Information: The second author was supported in part by the Israel Science Foundation through grant No. 827/12.; 20th International Workshop on Fast Software Encryption, FSE 2013 ; Conference date: 11-03-2013 Through 13-03-2013",
year = "2014",
month = jan,
day = "1",
doi = "https://doi.org/10.1007/978-3-662-43933-3_12",
language = "American English",
isbn = "9783662439326",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "219--240",
booktitle = "Fast Software Encryption - 20th International Workshop, FSE 2013, Revised Selected Papers",
address = "Germany",
}