Cryptanalyse

lundi 23 décembre 2024, 14:18  #1
Cryptanalyse - SHA-3
mekiekizeki
  • 1 posts

Hello...

I’m currently engaged in a Keccak SHA-3 challenge and have reached a complex juncture.

This challenge requires me to interpret and reverse-engineer transformations within the Keccak hash function, focusing heavily on the roles of special characters and systematic patterns such as byte rotations and XOR effects.
While I have identified several transformations, I am seeking deeper theoretical insights or methodologies to accurately predict and validate these patterns. Does anyone have experience or resources they could share about analyzing transformations within Keccak ? I would greatly appreciate advice on strategies for reverse-engineering these patterns or insights on handling layered encodings and pattern behavior during transformations.

Thank you !