Improved Cryptanalysis of Skein

2009-12-10
Aumasson, Jean-Philippe
Calik, Cagdas
Meier, Willi
Oezen, Onur
Phan, Raphael C-W.
Varici, Kerem
The hash function Skein is the submission of Ferguson et al. to the NIST Hash Competition, and is arguably a serious candidate for selection as SHA-3. This paper presents the first third-party analysis of Skein, with an extensive study of its main component: the block cipher Threefish. We notably investigate near collisions, distinguishers, impossible differentials, key recovery using related-key differential and boomerang attacks. In particular, we present near collisions on up to 17 rounds, an impossible differential on 21 rounds, a related-key boomerang distinguisher on 34 rounds, a known-related-key boomerang distinguisher on 35 rounds, and key recovery attacks on up to 32 rounds, out of 72 in total for Threefish-512. None of our attacks directly extends to the full Skein hash. However, the pseudorandomness of Threefish is required to validate the security proofs on Skein, and our results conclude that at least 36 rounds of Threefish seem required for optimal security guarantees.
15th International Conference on the Theory and Application of Cryptology and Information Security

Suggestions

An improved all-pass watermarking scheme for speech and audio
Çiloğlu, Tolga (2000-08-02)
This paper investigates some problems encountered in the all-pass watermarking scheme developed by Yardymcy et al. [II and suggest ways to eliminate it. The system under consideration uses all-pass filters to embed data into a speech or music signal by phase modification in consecutive blocks. Some artefacts in doing so. The two approaches we suggest in this paper remove these artefacts while keeping the watermark detectable and all the advantages of the method. The results of the experimental studies relat...
Investigation of the dynamic properties of plate-like structures
Kahraman, Engin; Şahin, Melin; Department of Aerospace Engineering (2011)
This study presents the investigation and the verification of the modal parameters of a plate-like structure by using different modal analysis methods. A fin-like structure which is generally used in aircraft is selected as a subcategory of a plate-like test structure. In the first part of the thesis, the natural frequencies and the corresponding mode shapes of the fin are extracted by Finite Element Analysis method. Classical Modal Analysis and Testing methods comprising both impact hammer and modal shaker...
Improvement of corpus-based semantic word similarity using vector space model
Esin, Yunus Emre; Alpaslan, Ferda Nur; Department of Computer Engineering (2009)
This study presents a new approach for finding semantically similar words from corpora using window based context methods. Previous studies mainly concentrate on either finding new combination of distance-weight measurement methods or proposing new context methods. The main di fference of this new approach is that this study reprocesses the outputs of the existing methods to update the representation of related word vectors used for measuring semantic distance between words, to improve the results further. ...
Improvement on Corpus-Based Word Similarity Using Vector-Space Models
ESİN, yunus emre; ALAN, özgür; Alpaslan, Ferda Nur (2009-09-16)
This paper presents a new approach for finding semantically similar words from large text collection using window based context methods. Previous studies on this problem mainly concentrate on finding new methods which are new combination of distance-weight measurement methods or new context methods. The main difference of our approach is that we focus on reprocessing of existing methods' outputs to update the representation of related_word vectors, which are used for measuring semantic distance between word...
Semantic information-based alternative plan generation for multiple query optimization
Polat, Faruk; Alhajj, R (Elsevier BV, 2001-09-01)
This paper addresses the impact of semantic information about queries on alternative plan generation (APG) for multiple query optimization (MQO). MQO covers optimizing the execution of a set of queries together where each query in the set to be optimized has several alternative execution plans. A multiple query optimizer selects an alternative plan for each query to obtain an optimal global execution plan. Our approach uses information such as common relations, common possible joins and common conditions to...
Citation Formats
J.-P. Aumasson, C. Calik, W. Meier, O. Oezen, R. C.-W. Phan, and K. Varici, “Improved Cryptanalysis of Skein,” Tokyo, Japan, 2009, vol. 5912, p. 542, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/68283.