On Keccak and SHA-3
Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1
1STMicroelectronics 2NXP Semiconductors
Icebreak 2013 Reykjavik, Iceland June 8, 2013
1 / 61
On Keccak and SHA-3 Guido Bertoni 1 Joan Daemen 1 Michal Peeters 2 - - PowerPoint PPT Presentation
On Keccak and SHA-3 Guido Bertoni 1 Joan Daemen 1 Michal Peeters 2 Gilles Van Assche 1 1 STMicroelectronics 2 NXP Semiconductors Icebreak 2013 Reykjavik, Iceland June 8, 2013 1 / 61 Outline 1 Origins 2 The sponge construction 3 Inside
1STMicroelectronics 2NXP Semiconductors
1 / 61
2 / 61
Origins
3 / 61
Origins
4 / 61
Origins The banality of DES
5 / 61
Origins The banality of DES
6 / 61
Origins Cellular automata based crypto
7 / 61
Origins Cellular automata based crypto
8 / 61
Origins Cellular automata based crypto
9 / 61
Origins Cellular automata based crypto
10 / 61
Origins Cellular automata based crypto
11 / 61
Origins Cellular automata based crypto
12 / 61
Origins Cellular automata based crypto
13 / 61
The sponge construction
14 / 61
The sponge construction
15 / 61
The sponge construction
16 / 61
The sponge construction
17 / 61
The sponge construction
17 / 61
The sponge construction
17 / 61
The sponge construction
18 / 61
The sponge construction
19 / 61
The sponge construction
20 / 61
The sponge construction
21 / 61
The sponge construction
22 / 61
The sponge construction
23 / 61
The sponge construction
24 / 61
The sponge construction
25 / 61
The sponge construction
26 / 61
The sponge construction
27 / 61
Inside Keccak
28 / 61
Inside Keccak
29 / 61
Inside Keccak
30 / 61
Inside Keccak
31 / 61
Inside Keccak
32 / 61
Inside Keccak
33 / 61
Inside Keccak
34 / 61
Inside Keccak
34 / 61
Inside Keccak
34 / 61
Inside Keccak
35 / 61
Inside Keccak
35 / 61
Inside Keccak
35 / 61
Inside Keccak
35 / 61
Inside Keccak
35 / 61
Inside Keccak
36 / 61
Inside Keccak
37 / 61
Inside Keccak
38 / 61
Inside Keccak
39 / 61
Inside Keccak
40 / 61
Inside Keccak
41 / 61
Inside Keccak
42 / 61
Inside Keccak
43 / 61
Inside Keccak
44 / 61
Inside Keccak
45 / 61
Inside Keccak
46 / 61
Inside Keccak
47 / 61
Inside Keccak
48 / 61
Inside Keccak
49 / 61
Inside Keccak
50 / 61
Inside Keccak
51 / 61
Inside Keccak
52 / 61
SHA-3 forecast
53 / 61
SHA-3 forecast
1024
54 / 61
SHA-3 forecast
1024
55 / 61
SHA-3 forecast
56 / 61
SHA-3 forecast
57 / 61
SHA-3 forecast
57 / 61
SHA-3 forecast
57 / 61
SHA-3 forecast
58 / 61
SHA-3 forecast
59 / 61
SHA-3 forecast
60 / 61
SHA-3 forecast
Sakura: a flexible coding for tree hashing, ePrint 2013 Debande, Le and KT , PA of HW impl. protected with secret sharing, HASP 2012 Permutation-based enc., auth. and auth. enc., DIAC 2012 Differential propagation in Keccak, FSE 2012 Van Keer and KT , Keccak implementation overview (version 3.1 or later) KeccakTools (version 3.2 or later) Duplexing the sponge: authenticated enc. and other applications, SAC 2011 On alignment in Keccak, Ecrypt II Hash Workshop 2011 On the security of the keyed sponge construction, SKEW 2011 The Keccak reference (version 3.0 or later) The Keccak SHA-3 submission, 2011 Building power analysis resistant implementations of Keccak, SHA-3 2010 Sponge-based pseudo-random number generators, CHES 2010 Note on zero-sum distinguishers of Keccak-f, NIST hash forum 2010 Note on Keccak parameters and usage, NIST hash forum 2010 Sufficient conditions for sound tree and seq. hashing modes, ePrint 2009 Note on side-channel attacks and their counterm…, NIST hash forum 2009 The road from Panama to Keccak via RadioGatún, Dagstuhl 2009 Cryptographic sponge functions (version 0.1 or later) On the indifferentiability of the sponge construction, Eurocrypt 2008 Sponge functions, comment to NIST and Ecrypt Hash Workshop 2007 http://sponge.noekeon.org/papers.html http://keccak.noekeon.org/papers.html
61 / 61