[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 5, Issue 2 (3-2017) ::
منادی 2017, 5(2): 3-14 Back to browse issues page
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3)
Masoumeh Safkhani * , Mohamadamin Arghavani
Shahid Rajaee Teacher Traning University
Abstract:   (4511 Views)
In recent years the security of SHA-3[1] is one of the most interesting topics in the field of cryptography. Cryptography uses Hash functions in different ways. Thus the security of Hash functions against different attacks is of vital importance. Several attacks and many analysis have been applied to SHA-3 till now but none of them could break it theoretically or practically. Keccak relies on a Sponge architecture.
In this paper, we focus on differential fault analysis attack and we review the latest attacks on SHA-3. Specifically, we describe cube attack, differential fault analysis and also describe zero-sum distinguisher attack and pre-image attack by using linear structures.
 
[1] Secure Hash Algorithm 3(SHA-3)
Keywords: SHA-3, Keccak, Differential Fault Analysis, Zero-sum Distinguisher Attack, Pre-image attack, Linear Structures.
Full-Text [PDF 5238 kb]   (880 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2017/01/3 | Accepted: 2017/08/23 | Published: 2017/10/3
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Safkhani M, Arghavani M. A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3). منادی 2017; 5 (2) :3-14
URL: http://monadi.isc.org.ir/article-1-76-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 5, Issue 2 (3-2017) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.07 seconds with 39 queries by YEKTAWEB 4645