On Wed, Oct 3, 2012 at 4:42 PM, ianG <[email protected]> wrote: > One thing I don't understand from a quick reading is the business about > KECCAK's flexibility. At a theoretical level, it's all very well saying > that we can dial in security and performance, but in practical > cryptoplumbing we need some standard measurands. How do we do this? Are we > waiting on NIST to come out with some lengths, or are we really requiring > our cryptoplumbers to actually understand the innards of KECCAK and wind the > dials themselves?
There's only two tweakables: word length (pretty much always 64 bits) and digest length (256 or 512 bits, practically). -- Taral <[email protected]> "Please let me know if there's any further trouble I can give you." -- Unknown _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
