Zusammenfassung
Wie beim DES-Nachfolger AES schrieb das US-amerikanische NIST 2007 einen öffentlichen Wettbewerb um die Nachfolge des Hashverfahrens SHA-2 aus. Im Oktober 2012 fiel die Wahl auf Keccak. Die Autoren stellen den Hashalgorithmus vor, beschreiben eine Smartcard-Implementierung und stellen das Verfahren dem „amtierenden“ SHA-2-Standard gegenüber.
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Literatur
Atmel Corporation: 8-bit AVR Microcontroller with 16K Bytes In-System Programmable Flash — ATmega163/ATmegaL, 2003.
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche: The KECCAK SHA-3 submission, January 2011, http://keccak.noekeon.org/Keccak-submission-3.pdf.
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche: Cryptographic sponge functions, January 2011, http://sponge.noekeon.org/CSF-0.1.pdf.
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche: The KECCAK reference, January 2011, http://keccak.noekeon.org/Keccak-reference-3.0.pdf.
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche: KECCAK implementation Overview, May 2012, http://keccak.noekeon.org/Keccak-implementation-3.2.pdf.
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche: Building power analysis resistant implementations of KECCAK, August 2010.
Hans, Dobbertin: Cryptanalysis of MD4, Journal of CRYPTOLOGY, October 1995. http://habbob.com.br/Cryptographie_et_Steganographie/Dobbertin_MD4.pdf.
Hans Dobbertin: Digitale Fingerabdrücke, Datenschutz und Datensicherheit (DuD), 2/1997, S. 82–87.
Tim Güneysu, Thomas Pöppelmann, Ingo von Maurich, Stefan Heyse et al.: Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices, 2012, http://eprint.iacr.org/2012/507.pdf.
Identity and Data Protection Beat: The KECCAK Effect — What SHA-3 Brings to the Table, October, 2012, http://blogs.rsa.com/keccak-effect/.
Antoine Joux, Florent Chabaud: Differential Collision in SHA-0, CRYPTO’ 98, 1998 http://fchabaud.free.fr/English/Publications/sha.pdf.
Elif Bilge Kavun, Tolga Yalcin: On the Suitability of SHA-3 Finalists for Leightweight Applications, Chair for Embedded Security, Bochum, Germany, 2012, http://csrc.nist.gov/groups/ST/hash/sha-3/Round3/March2012/documents/papers/KAVUN_paper.pdf
Stephane Manuel: Classification and generation of disturbance vectors for collision attacks against SHA-1, Designs, Codes and Cryptography, Volume 59,Issue 1–3, April 2011, Pages 247–263, http://eprint.iacr.org/2008/469.pdf.
Ralph Charles Merkle: Secrecy, Authentication, and Public Key Systems. Technical Report No. 1979-1, June 1979, Standford University http://www.merkle.com/papers/Thesis1979.pdf.
Christof Paar, Jan Pelzl: Understanding Cryptography — A Textbook for Students and Practitioners, Springer, 2010. [TuneKec]_http://keccak.noekeon.org/tune.html.
Rüdiger Weis, Stefan Lucks: Die dritte AES-Konferenz in New York. Datenschutz und Datensicherheit (DuD), 7/2000, S. 415–416.
Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongobo Yu: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, School of Mathematics and System Science, Shandong University, China, August 2004, http://eprint.iacr.org/2004/199.pdf.
Christopher Wolf, Erik Zenner: Zur Sicherheit von SHA-1. Datenschutz und Datensicherheit (DuD), 5/2005, S. 275–278.
Additional information
M. SC. Pawel Swierczynski Wissenschaftlicher Mitarbeiter am Lehrstuhl Embedded Security, Ruhr-Universität Bochum (HGI).
Dr. Gregor Leander Postdoc am Lehrstuhl Embedded Security, Ruhr-Universität Bochum (HGI).
Prof. Dr.-Ing. Christof Paar Inhaber des Lehrstuhls für Embedded Security, Ruhr-Universität Bochum (HGI).
Rights and permissions
About this article
Cite this article
Swierczynski, P., Leander, G. & Paar, C. Keccak und der SHA-2. Datenschutz Datensich 37, 712–719 (2013). https://doi.org/10.1007/s11623-013-0299-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11623-013-0299-3