If one skims this presentation by Joan Daemen, co-inventer of Keccak, it seems that the algorithm can also be used for the other modes -- encryption, (h)mac, authenticated encryption as well as message digest.

http://www.hyperelliptic.org/DIAC/slides/PermutationDIAC2012.pdf

If so, we may be in sight of a great simplification in symmetric crypto - one algorithm to handle all the modes and needs.

Is this a theory position or has it reached practicality? Have there been any posted descriptions in how to use the core Keccak in these different ways?



iang
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to