@ARTICLE{Safkhani, author = {Safkhani, Masoumeh and Arghavani, Mohamadamin and }, title = { A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3)}, volume = {5}, number = {2}, abstract ={In recent years the security of SHA-3[1] is one of the most interesting topics in the field of cryptography. Cryptography uses Hash functions in different ways. Thus the security of Hash functions against different attacks is of vital importance. Several attacks and many analysis have been applied to SHA-3 till now but none of them could break it theoretically or practically. Keccak relies on a Sponge architecture. In this paper, we focus on differential fault analysis attack and we review the latest attacks on SHA-3. Specifically, we describe cube attack, differential fault analysis and also describe zero-sum distinguisher attack and pre-image attack by using linear structures. [1] Secure Hash Algorithm 3(SHA-3) }, URL = {http://monadi.isc.org.ir/article-1-76-en.html}, eprint = {http://monadi.isc.org.ir/article-1-76-en.pdf}, journal = {Biannual Journal Monadi for Cyberspace Security (AFTA)}, doi = {}, year = {2017} }