SlideShare a Scribd company logo
5
Most read
6
Most read
13
Most read
Gennaro Caccavale, Student@UniParthenope
June 2013
Input message Digest
h : {0, 1}* {0, 1}n
A cryptographic hash function is an algorithm that takes an
arbitrary block of data and returns a fixed-size bit string, the
(cryptographic) hash value, such that any change to the
data will change the hash value. The data to be encoded
are often called the "message," and the hash value is
sometimes called the message digest or simply digest.
MD5 MD = 128 (Ron Rivest, 1992)
SHA-1 MD = 160 (NSA, NIST, 1995)
SHA-2 MD = 224/256/384/512 (NSA, NIST, 2001)
SHA-3 MD = arbitrary (Bertoni, Daemen, Peeters, Van Assche, NIST, 20
• Cryptographic hash function, SHA family
• Selected on October 2012 as the winner of the NIST
hash function competition
• Not meant to replace SHA-2
• Based on the sponge construction
More general than a hash function: arbitrary-length output
Calls a b-bit permutation f, with b = r + c
r bits of rate
c bits of capacity
SHA-3, Keccak & Sponge function
SHA-3, Keccak & Sponge function
The duplex construction allows the alternation of input and
output blocks at the same rate as the sponge construction,
like a full-duplex communication
• High level of parallelism
• Flexibility: bit-interleaving
• Software: competitive on wide range of CPU (also implem. for
CUDA)
• Dedicated hardware: very competitive
• Suited for protection against side-channel attack
• Faster than SHA-2 on all modern PC (12.5cpb on C2D)
• http://keccak.noekeon.org/tune.html
If an attacker has access to one billion computers, each
performing one billion evaluations of Keccak-f per second,
it would take about 1.6×1061 years (1.1×1051 times the
estimated age of the universe) to evaluate the permutation
2288 times
KECCAK-f[r+c]
KECCAK-f[1024+576]
KECCAK-f[1600]
SHA-3, Keccak & Sponge function
In the pseudo-code above, S denotes the state as an array of
lanes. The padded message P is organised as an array of blocks
Pi, themselves organized as arrays of lanes. The || operator
denotes the usual byte string concatenation.
SHA-3, Keccak & Sponge function
SHA-3, Keccak & Sponge function
SHA-3, Keccak & Sponge function
• Currently best attack on KECCAK: 4 rounds
• Sufficient nr. of rounds for security claim on KECCAK: 13
rounds
• KECCAK has 24 rounds (complexity 215xx)
• http://en.wikipedia.org/wiki/SHA-3
• http://sponge.noekeon.org/
• http://keccak.noekeon.org/specs_summary.html
• http://csrc.nist.gov/groups/ST/hash/sha-
3/documents/Keccak-slides-at-NIST.pdf
• http://celan.informatik.uni-
oldenburg.de/kryptos/info/keccak/overview/
...
SHA-3, Keccak & Sponge function

More Related Content

PDF
Keccak
PPT
Gsm radio-interface
PPT
Hash crypto
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Congestion control
PPT
Digital Signature Standard
PPTX
5. message authentication and hash function
PPT
Message Authentication Code & HMAC
Keccak
Gsm radio-interface
Hash crypto
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Congestion control
Digital Signature Standard
5. message authentication and hash function
Message Authentication Code & HMAC

What's hot (20)

PPTX
ElGamal Encryption Algoritham.pptx
PPT
Network security cryptographic hash function
PPTX
Monolithic kernel
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPTX
BCH Codes
PPTX
Secure Hash Algorithm (SHA-512)
PPTX
Hash Function
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Kerberos
PPT
Chap 12 tcp
PDF
SSH - Secure Shell
PPTX
Address resolution protocol (ARP)
PPTX
Cache coherence ppt
PPTX
Message digest 5
PPSX
Error control
PDF
4. The Advanced Encryption Standard (AES)
PPSX
Perceptron (neural network)
PPTX
Convolution codes and turbo codes
ElGamal Encryption Algoritham.pptx
Network security cryptographic hash function
Monolithic kernel
Cryptography and Network Security William Stallings Lawrie Brown
BCH Codes
Secure Hash Algorithm (SHA-512)
Hash Function
Block Ciphers and the Data Encryption Standard
Kerberos
Chap 12 tcp
SSH - Secure Shell
Address resolution protocol (ARP)
Cache coherence ppt
Message digest 5
Error control
4. The Advanced Encryption Standard (AES)
Perceptron (neural network)
Convolution codes and turbo codes
Ad

Viewers also liked (12)

PDF
The SHA Hashing Algorithm
PPT
Secure hashing algorithm
PPT
MD5Algorithm
PDF
The MD5 hashing algorithm
PDF
PDF
Fungsi Hash & Algoritma SHA-256 - Presentation
PDF
Mémoire HEC Entrepreneurs - L'Entrepreneuriat dans le Sport
PPT
PPT
Hash Function & Analysis
PDF
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
PPTX
Secure Hash Algorithm
PPT
Routing algorithm
The SHA Hashing Algorithm
Secure hashing algorithm
MD5Algorithm
The MD5 hashing algorithm
Fungsi Hash & Algoritma SHA-256 - Presentation
Mémoire HEC Entrepreneurs - L'Entrepreneuriat dans le Sport
Hash Function & Analysis
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Secure Hash Algorithm
Routing algorithm
Ad

Similar to SHA-3, Keccak & Sponge function (20)

PDF
CNIT 141: 6. Hash Functions
PPT
secure hash function for authentication in CNS
PPT
presentation on keccak algorithm functionality
PPT
keccak.ppt that is about introduction and basics
PDF
CNIT 141: 6. Hash Functions
PDF
Sha
PDF
CNIT 141 6. Hash Functions
PPT
An Introduction to Hashing: A basic understanding
PPTX
Message Digest message digest ppttsx.pptx
PDF
Public Key Encryption & Hash functions
PDF
alorithms yhuixeuy ydheujj uehq hu dguhd ued2.pdf
PPT
SHA 3 algorithm introduction, diagram, design
PPTX
Hash Techniques in Cryptography
PPTX
Network Security Unit-2 topic Part-2.pptx
PDF
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PDF
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PDF
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PPTX
Data streaming algorithms
PDF
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
PPTX
Secure Hash Algorithm (SHA 256) - Detailed Architecture
CNIT 141: 6. Hash Functions
secure hash function for authentication in CNS
presentation on keccak algorithm functionality
keccak.ppt that is about introduction and basics
CNIT 141: 6. Hash Functions
Sha
CNIT 141 6. Hash Functions
An Introduction to Hashing: A basic understanding
Message Digest message digest ppttsx.pptx
Public Key Encryption & Hash functions
alorithms yhuixeuy ydheujj uehq hu dguhd ued2.pdf
SHA 3 algorithm introduction, diagram, design
Hash Techniques in Cryptography
Network Security Unit-2 topic Part-2.pptx
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
Data streaming algorithms
ASFWS 2012 - Hash-flooding DoS reloaded: attacks and defenses par Jean-Philip...
Secure Hash Algorithm (SHA 256) - Detailed Architecture

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
Teaching material agriculture food technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectral efficient network and resource selection model in 5G networks
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Digital-Transformation-Roadmap-for-Companies.pptx
Teaching material agriculture food technology
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Spectroscopy.pptx food analysis technology
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”

SHA-3, Keccak & Sponge function

  • 2. Input message Digest h : {0, 1}* {0, 1}n
  • 3. A cryptographic hash function is an algorithm that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that any change to the data will change the hash value. The data to be encoded are often called the "message," and the hash value is sometimes called the message digest or simply digest. MD5 MD = 128 (Ron Rivest, 1992) SHA-1 MD = 160 (NSA, NIST, 1995) SHA-2 MD = 224/256/384/512 (NSA, NIST, 2001) SHA-3 MD = arbitrary (Bertoni, Daemen, Peeters, Van Assche, NIST, 20
  • 4. • Cryptographic hash function, SHA family • Selected on October 2012 as the winner of the NIST hash function competition • Not meant to replace SHA-2 • Based on the sponge construction
  • 5. More general than a hash function: arbitrary-length output Calls a b-bit permutation f, with b = r + c r bits of rate c bits of capacity
  • 8. The duplex construction allows the alternation of input and output blocks at the same rate as the sponge construction, like a full-duplex communication
  • 9. • High level of parallelism • Flexibility: bit-interleaving • Software: competitive on wide range of CPU (also implem. for CUDA) • Dedicated hardware: very competitive • Suited for protection against side-channel attack • Faster than SHA-2 on all modern PC (12.5cpb on C2D)
  • 10. • http://keccak.noekeon.org/tune.html If an attacker has access to one billion computers, each performing one billion evaluations of Keccak-f per second, it would take about 1.6×1061 years (1.1×1051 times the estimated age of the universe) to evaluate the permutation 2288 times KECCAK-f[r+c] KECCAK-f[1024+576] KECCAK-f[1600]
  • 12. In the pseudo-code above, S denotes the state as an array of lanes. The padded message P is organised as an array of blocks Pi, themselves organized as arrays of lanes. The || operator denotes the usual byte string concatenation.
  • 16. • Currently best attack on KECCAK: 4 rounds • Sufficient nr. of rounds for security claim on KECCAK: 13 rounds • KECCAK has 24 rounds (complexity 215xx)
  • 17. • http://en.wikipedia.org/wiki/SHA-3 • http://sponge.noekeon.org/ • http://keccak.noekeon.org/specs_summary.html • http://csrc.nist.gov/groups/ST/hash/sha- 3/documents/Keccak-slides-at-NIST.pdf • http://celan.informatik.uni- oldenburg.de/kryptos/info/keccak/overview/ ...