TY - JOUR T1 - A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) TT - مروری بر حملات مکعبی، خطای تفاضلی و ساختارهای خطی بر روی تابع کچک(SHA-3) JF - isc-monadi JO - isc-monadi VL - 5 IS - 2 UR - http://monadi.isc.org.ir/article-1-76-en.html Y1 - 2017 SP - 3 EP - 14 KW - SHA-3 KW - Keccak KW - Differential Fault Analysis KW - Zero-sum Distinguisher Attack KW - Pre-image attack KW - Linear Structures. N2 - In recent years the security of SHA-3[1] is one of the most interesting topics in the field of cryptography. Cryptography uses Hash functions in different ways. Thus the security of Hash functions against different attacks is of vital importance. Several attacks and many analysis have been applied to SHA-3 till now but none of them could break it theoretically or practically. Keccak relies on a Sponge architecture. In this paper, we focus on differential fault analysis attack and we review the latest attacks on SHA-3. Specifically, we describe cube attack, differential fault analysis and also describe zero-sum distinguisher attack and pre-image attack by using linear structures. [1] Secure Hash Algorithm 3(SHA-3) M3 ER -