Keccak, More Than Just SHA3SUM
Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1
1STMicroelectronics 2NXP Semiconductors
FOSDEM 2013, Brussels, February 2-3, 2013
1 / 36
Keccak, More Than Just SHA3SUM Guido Bertoni 1 Joan Daemen 1 Michal - - PowerPoint PPT Presentation
Keccak, More Than Just SHA3SUM Guido Bertoni 1 Joan Daemen 1 Michal Peeters 2 Gilles Van Assche 1 1 STMicroelectronics 2 NXP Semiconductors FOSDEM 2013, Brussels, February 2-3, 2013 1 / 36 Outline 1 How it all began 2 Introducing Keccak 3
1STMicroelectronics 2NXP Semiconductors
1 / 36
2 / 36
How it all began
3 / 36
How it all began
4 / 36
How it all began
5 / 36
How it all began
6 / 36
How it all began
7 / 36
How it all began
8 / 36
How it all began
ARIRANG AURORA BLAKE Blender BOOLE CHI CRUNCH CubeHash DCH EDON-R EnRUPT ESSENCE FSB Fugue Grøstl JH LANE Lesamnta Luffa MCSSHA3 MD6 Sgàil Shabal SHAMATA SIMD Skein StreamHash SWIFFTX T angle TIB3 T wister Vortex WaMM HASH 2X Maraca Ponic ZK-Crypt Waterfall Sarmal BMW SANDstorm Spectral Hash DynamicSHA NKS2D Abacus MeshHash DynamicSHA 2 Khichidi-1 ECOH LUX NaSHA Hamsi Keccak SHAvite-3 ECHO Cheetah
2005 2006 2007 2008 2009 2010 2011 2012 16/06/2009
9 / 36
How it all began
10 / 36
Introducing Keccak
11 / 36
Introducing Keccak The sponge construction
12 / 36
Introducing Keccak The sponge construction
13 / 36
Introducing Keccak The sponge construction
13 / 36
More than just SHA3SUM
14 / 36
More than just SHA3SUM One primitive to rule them all
15 / 36
More than just SHA3SUM One primitive to rule them all
16 / 36
More than just SHA3SUM One primitive to rule them all
17 / 36
More than just SHA3SUM One primitive to rule them all
17 / 36
More than just SHA3SUM One primitive to rule them all
18 / 36
More than just SHA3SUM One primitive to rule them all
19 / 36
More than just SHA3SUM One primitive to rule them all
20 / 36
More than just SHA3SUM One primitive to rule them all
21 / 36
More than just SHA3SUM Security
22 / 36
More than just SHA3SUM Security
22 / 36
More than just SHA3SUM Security
22 / 36
More than just SHA3SUM Security
22 / 36
More than just SHA3SUM Security
22 / 36
Inside Keccak
23 / 36
Inside Keccak
KECCAK-F[b](A) { forall i in 0…nr-1 A = Round[b](A, RC[i]) return A } Round[b](A,RC) { θ step C[x] = A[x,0] xor A[x,1] xor A[x,2] xor A[x,3] xor A[x,4], forall x in 0…4 D[x] = C[x-1] xor rot(C[x+1],1), forall x in 0…4 A[x,y] = A[x,y] xor D[x], forall (x,y) in (0…4,0…4) ρ and π steps B[y,2*x+3*y] = rot(A[x,y], r[x,y]), forall (x,y) in (0…4,0…4) χ step A[x,y] = B[x,y] xor ((not B[x+1,y]) and B[x+2,y]), forall (x,y) in (0…4,0…4) ι step A[0,0] = A[0,0] xor RC return A }
24 / 36
Inside Keccak
25 / 36
Inside Keccak
26 / 36
Inside Keccak Implementation tricks
27 / 36
Keccak and the community
28 / 36
Keccak and the community SHA-3, an open contest
29 / 36
Keccak and the community Cryptanalysis prizes
30 / 36
Keccak and the community Cryptanalysis prizes
31 / 36
Keccak and the community Cryptanalysis prizes
32 / 36
Keccak and the community Implementations
33 / 36
Keccak and the community Implementations
Permutation
Sponge Duplex
Hashing MAC PRNG
34 / 36
Questions
35 / 36
Questions
36 / 36