If one skims this presentation by Joan Daemen, co-inventer of Keccak, it
seems that the algorithm can also be used for the other modes --
encryption, (h)mac, authenticated encryption as well as message digest.
http://www.hyperelliptic.org/DIAC/slides/PermutationDIAC2012.pdf
If so, we may be in sight of a great simplification in symmetric crypto
- one algorithm to handle all the modes and needs.
Is this a theory position or has it reached practicality? Have there
been any posted descriptions in how to use the core Keccak in these
different ways?
iang
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography