Keccak and the SHA-3 Standardization
Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1
1STMicroelectronics 2NXP Semiconductors
NIST , Gaithersburg, MD February 6, 2013
1 / 60
Keccak and the SHA-3 Standardization Guido Bertoni 1 Joan Daemen 1 - - PowerPoint PPT Presentation
Keccak and the SHA-3 Standardization Guido Bertoni 1 Joan Daemen 1 Michal Peeters 2 Gilles Van Assche 1 1 STMicroelectronics 2 NXP Semiconductors NIST , Gaithersburg, MD February 6, 2013 1 / 60 Outline 1 2 3 4 5 6 The beginning The sponge
1STMicroelectronics 2NXP Semiconductors
1 / 60
2 / 60
The beginning
3 / 60
The beginning
4 / 60
The beginning
5 / 60
The beginning
6 / 60
The sponge construction
7 / 60
The sponge construction
8 / 60
The sponge construction
9 / 60
The sponge construction
10 / 60
The sponge construction
11 / 60
The sponge construction
12 / 60
Inside Keccak
13 / 60
Inside Keccak
14 / 60
Inside Keccak
15 / 60
Inside Keccak
15 / 60
Inside Keccak
15 / 60
Inside Keccak
15 / 60
Inside Keccak
15 / 60
Inside Keccak
16 / 60
Inside Keccak
17 / 60
Inside Keccak
18 / 60
Inside Keccak
19 / 60
Inside Keccak
20 / 60
Inside Keccak
21 / 60
Inside Keccak
22 / 60
Inside Keccak
23 / 60
Inside Keccak
24 / 60
Inside Keccak
′ ,y ′ with
25 / 60
Inside Keccak
26 / 60
Inside Keccak
27 / 60
Inside Keccak
28 / 60
Inside Keccak
29 / 60
Inside Keccak
30 / 60
Inside Keccak
31 / 60
Analysis underlying Keccak
32 / 60
Analysis underlying Keccak
33 / 60
Analysis underlying Keccak
34 / 60
Analysis underlying Keccak
35 / 60
Analysis underlying Keccak
36 / 60
Applications of Keccak, or sponge
37 / 60
Applications of Keccak, or sponge
38 / 60
Applications of Keccak, or sponge
39 / 60
Applications of Keccak, or sponge
39 / 60
Applications of Keccak, or sponge
40 / 60
Applications of Keccak, or sponge
41 / 60
Applications of Keccak, or sponge
42 / 60
Applications of Keccak, or sponge
43 / 60
Applications of Keccak, or sponge
44 / 60
Applications of Keccak, or sponge
45 / 60
Applications of Keccak, or sponge
45 / 60
Some ideas for the SHA-3 standard
46 / 60
Some ideas for the SHA-3 standard Capacity and security strength levels
1024
47 / 60
Some ideas for the SHA-3 standard Capacity and security strength levels
1024
48 / 60
Some ideas for the SHA-3 standard Capacity and security strength levels
49 / 60
Some ideas for the SHA-3 standard Capacity and security strength levels
49 / 60
Some ideas for the SHA-3 standard Capacity and security strength levels
49 / 60
Some ideas for the SHA-3 standard Capacity and security strength levels
49 / 60
Some ideas for the SHA-3 standard Structure
50 / 60
Some ideas for the SHA-3 standard Input formatting
51 / 60
Some ideas for the SHA-3 standard Input formatting
52 / 60
Some ideas for the SHA-3 standard Input formatting
53 / 60
Some ideas for the SHA-3 standard Parallel hashing
54 / 60
Some ideas for the SHA-3 standard Parallel hashing
55 / 60
Some ideas for the SHA-3 standard Parallel hashing
55 / 60
Some ideas for the SHA-3 standard Parallel hashing
55 / 60
Some ideas for the SHA-3 standard Parallel hashing
56 / 60
Some ideas for the SHA-3 standard Parallel hashing
57 / 60
Some ideas for the SHA-3 standard Parallel hashing
58 / 60
Some ideas for the SHA-3 standard Parallel hashing
59 / 60
Conclusion
60 / 60