License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.09031.17
URN: urn:nbn:de:0030-drops-19587
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2009/1958/
Go to the corresponding Portal |
Bertoni, Guido ;
Daemen, Joan ;
Peeters, Michaël ;
Van Assche, Gilles
The Road from Panama to Keccak via RadioGatún
Abstract
In this presentation, we explain the design choices of Panama [1] and RadioGatun [2], which lead to Keccak [3]. After a brief recall of Panama, RadioGatun and the trail backtracking cost, we focus on three important aspects. First, we explain the role of the belt in the light of differential trails. Second, we discuss the relative advantages of a block mode hash function compared to a stream mode one. Finally, we point out why Panama and RadioGatun are not sponge functions and why their design philosophy differs from that of Keccak.
[1] J. Daemen and C. S. K. Clapp, FSE 1998
[2] G. Bertoni et al., NIST Hash Workshop 2006
[3] G. Bertoni et al., SHA-3 submission, 2008
BibTeX - Entry
@InProceedings{bertoni_et_al:DagSemProc.09031.17,
author = {Bertoni, Guido and Daemen, Joan and Peeters, Micha\"{e}l and Van Assche, Gilles},
title = {{The Road from Panama to Keccak via RadioGat\'{u}n}},
booktitle = {Symmetric Cryptography},
pages = {1--9},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2009},
volume = {9031},
editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2009/1958},
URN = {urn:nbn:de:0030-drops-19587},
doi = {10.4230/DagSemProc.09031.17},
annote = {Keywords: Hash function, cryptography}
}
Keywords: |
|
Hash function, cryptography |
Collection: |
|
09031 - Symmetric Cryptography |
Issue Date: |
|
2009 |
Date of publication: |
|
30.03.2009 |