Keccak is a family of sponge functions. The sponge function is a generalization of the concept of cryptographic hash function with infinite output and can perform quasi all symmetric cryptographic functions, from hashing to pseudo-random number generation to authenticated encryption. For a quick introduction, we propose a pseudo-code description of Keccak. The reference specification, analysis, reference and optimized code and test vectors for Keccak can be found in the file section. As primitive used in the sponge construction, the Keccak instances call one of seven permutations named Keccak-f[b], with b=25, 50, 100, 200, 400, 800 or 1600. In the scope of the SHA-3 contest, we proposed the largest permutation, namely Keccak-f[1600], but smaller (or more “lightweight”) permutations can be used in constrained environments. Each permutation consists of the iteration of a simple round function, similar to a block cipher without a key schedule. The choice of operations is limited to bitwise XOR, AND and NOT and rotations. There is no need for table-lookups, arithmetic operations, or data-dependent rotations. Keccak has a very different design philosophy from its predecessor RadioGatún. This is detailed in our paper presented at Dagstuhl in 2009.

References in zbMATH (referenced in 86 articles , 1 standard article )

Showing results 1 to 20 of 86.
Sorted by year (citations)

1 2 3 4 5 next

  1. Chen, Shiyao; Fan, Yanhong; Sun, Ling; Fu, Yong; Zhou, Haibo; Li, Yongqing; Wang, Meiqin; Wang, Weijia; Guo, Chun: SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations (2022)
  2. Chen, Yu-Ao; Gao, Xiao-Shan: Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems (2022)
  3. Cid, Carlos; Indrøy, John Petter; Raddum, Håvard: FASTA -- a stream cipher for fast FHE evaluation (2022)
  4. Lu, Zhenyu; Mesnager, Sihem; Cui, Tingting; Fan, Yanhong; Wang, Meiqin: An STP-based model toward designing S-boxes with good cryptographic properties (2022)
  5. Bisheh-Niasar, Mojtaba; Azarderakhsh, Reza; Mozaffari-Kermani, Mehran: A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates (2021)
  6. Bordes, Nicolas; Daemen, Joan; Kuijsters, Daniël; Van Assche, Gilles: Thinking outside the superbox (2021)
  7. Cui, Tingting; Grassi, Lorenzo: Algebraic key-recovery attacks on reduced-round Xoofff (2021)
  8. Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian; Schläffer, Martin: \textscAsconv1.2: lightweight authenticated encryption and hashing (2021)
  9. Gu, Yanqi; Jarecki, Stanislaw; Krawczyk, Hugo: KHAPE: Asymmetric PAKE from key-hiding key exchange (2021)
  10. Liu, Meicheng; Lu, Xiaojuan; Lin, Dongdai: Differential-linear cryptanalysis from an algebraic perspective (2021)
  11. Mariot, Luca; Saletta, Martina; Leporati, Alberto; Manzoni, Luca: Exploring semi-bent Boolean functions arising from cellular automata (2021)
  12. Mennink, Bart; Neves, Samuel: On the resilience of Even-Mansour to invariant permutations (2021)
  13. Shi, Tairong; Wu, Wenling; Hu, Bin; Guan, Jie; Wang, Sengpeng: Breaking LWC candidates: sESTATE and Elephant in quantum setting (2021)
  14. Udvarhelyi, Balazs; Bronchain, Olivier; Standaert, François-Xavier: Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (2021)
  15. Zhao, Zishen; Chen, Shiyao; Wang, Meiqin; Wang, Wei: Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC (2021)
  16. Dobraunig, Christoph; Mendel, Florian; Mennink, Bart: Practical forgeries for ORANGE (2020)
  17. Grassi, Lorenzo; Rechberger, Christian: Revisiting Gilbert’s known-key distinguisher (2020)
  18. Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling: Practical collision attacks against round-reduced SHA-3 (2020)
  19. Kölbl, Stefan; Tischhauser, Elmar; Derbez, Patrick; Bogdanov, Andrey: Troika: a ternary cryptographic hash function (2020)
  20. Liu, Hongjun; Kadir, Abdurahman; Ma, Chao; Xu, Chengbo: Constructing keyed hash algorithm using enhanced chaotic map with varying parameter (2020)

1 2 3 4 5 next