Keccak is a family of sponge functions. The sponge function is a generalization of the concept of cryptographic hash function with infinite output and can perform quasi all symmetric cryptographic functions, from hashing to pseudo-random number generation to authenticated encryption. For a quick introduction, we propose a pseudo-code description of Keccak. The reference specification, analysis, reference and optimized code and test vectors for Keccak can be found in the file section. As primitive used in the sponge construction, the Keccak instances call one of seven permutations named Keccak-f[b], with b=25, 50, 100, 200, 400, 800 or 1600. In the scope of the SHA-3 contest, we proposed the largest permutation, namely Keccak-f[1600], but smaller (or more “lightweight”) permutations can be used in constrained environments. Each permutation consists of the iteration of a simple round function, similar to a block cipher without a key schedule. The choice of operations is limited to bitwise XOR, AND and NOT and rotations. There is no need for table-lookups, arithmetic operations, or data-dependent rotations. Keccak has a very different design philosophy from its predecessor RadioGatún. This is detailed in our paper presented at Dagstuhl in 2009.

References in zbMATH (referenced in 70 articles , 1 standard article )

Showing results 1 to 20 of 70.
Sorted by year (citations)

1 2 3 4 next

  1. Dobraunig, Christoph; Mendel, Florian; Mennink, Bart: Practical forgeries for ORANGE (2020)
  2. Grassi, Lorenzo; Rechberger, Christian: Revisiting Gilbert’s known-key distinguisher (2020)
  3. Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling: Practical collision attacks against round-reduced SHA-3 (2020)
  4. Kales, Daniel; Ramacher, Sebastian; Rechberger, Christian; Walch, Roman; Werner, Mario: Efficient FPGA implementations of LowMC and \textscPicnic (2020)
  5. Kölbl, Stefan; Tischhauser, Elmar; Derbez, Patrick; Bogdanov, Andrey: Troika: a ternary cryptographic hash function (2020)
  6. Bansal, Tarun Kumar; Boyen, Xavier; Pieprzyk, Josef: Signcryption schemes with insider security in an ideal permutation model (2019)
  7. Dobraunig, Christoph; Mangard, Stefan; Mendel, Florian; Primas, Robert: Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje (2019)
  8. Gao, Guangpu; Lin, Dongdai; Liu, Wenfen: A note on rotation symmetric S-boxes (2019)
  9. Mariot, Luca; Picek, Stjepan; Leporati, Alberto; Jakobovic, Domagoj: Cellular automata based S-boxes (2019)
  10. Neves, Samuel; Araujo, Filipe: An observation on NORX, BLAKE2, and ChaCha (2019)
  11. Stoffelen, Ko: Efficient cryptography on the RISC-V architecture (2019)
  12. Bertoni, Guido; Daemen, Joan; Peeters, Michaël; Van Assche, Gilles; Van Keer, Ronny; Viguier, Benoît: \textscKangarooTwelve: fast hashing based on (\mathrmKECCAK\mathrm-p) (2018)
  13. Bi, Wenquan; Li, Zheng; Dong, Xiaoyang; Li, Lu; Wang, Xiaoyun: Conditional cube attack on round-reduced River Keyak (2018)
  14. Hong, Deukjo; Koo, Bonwook; Seo, Changho: Differential property of \textscPresent-like structure (2018)
  15. Liu, Yunwen; Rijmen, Vincent; Leander, Gregor: Nonlinear diffusion layers (2018)
  16. Sasdrich, Pascal; Hutter, Michael: Protecting triple-DES against DPA. A practical application of domain-oriented masking (2018)
  17. Lavanya, M.; Natarajan, V.: LWDSA: light-weight digital signature algorithm for wireless sensor networks (2017)
  18. Pizzolante, Raffaele; Carpentieri, Bruno: Hyperspectral data: efficient and secure transmission (2017)
  19. Qiao, Kexin; Song, Ling; Liu, Meicheng; Guo, Jian: New collision attacks on round-reduced Keccak (2017)
  20. Renes, Joost; Smith, Benjamin: qDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairs (2017)

1 2 3 4 next