Skip to main content
Log in

Keccak und der SHA-2

  • Aufsätze
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Zusammenfassung

Wie beim DES-Nachfolger AES schrieb das US-amerikanische NIST 2007 einen öffentlichen Wettbewerb um die Nachfolge des Hashverfahrens SHA-2 aus. Im Oktober 2012 fiel die Wahl auf Keccak. Die Autoren stellen den Hashalgorithmus vor, beschreiben eine Smartcard-Implementierung und stellen das Verfahren dem „amtierenden“ SHA-2-Standard gegenüber.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. Atmel Corporation: 8-bit AVR Microcontroller with 16K Bytes In-System Programmable Flash — ATmega163/ATmegaL, 2003.

    Google Scholar 

  2. Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche: The KECCAK SHA-3 submission, January 2011, http://keccak.noekeon.org/Keccak-submission-3.pdf.

    MATH  Google Scholar 

  3. Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche: Cryptographic sponge functions, January 2011, http://sponge.noekeon.org/CSF-0.1.pdf.

    MATH  Google Scholar 

  4. Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche: The KECCAK reference, January 2011, http://keccak.noekeon.org/Keccak-reference-3.0.pdf.

    MATH  Google Scholar 

  5. Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche: KECCAK implementation Overview, May 2012, http://keccak.noekeon.org/Keccak-implementation-3.2.pdf.

    MATH  Google Scholar 

  6. Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche: Building power analysis resistant implementations of KECCAK, August 2010.

    Google Scholar 

  7. Hans, Dobbertin: Cryptanalysis of MD4, Journal of CRYPTOLOGY, October 1995. http://habbob.com.br/Cryptographie_et_Steganographie/Dobbertin_MD4.pdf.

    MATH  Google Scholar 

  8. Hans Dobbertin: Digitale Fingerabdrücke, Datenschutz und Datensicherheit (DuD), 2/1997, S. 82–87.

    Google Scholar 

  9. Tim Güneysu, Thomas Pöppelmann, Ingo von Maurich, Stefan Heyse et al.: Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices, 2012, http://eprint.iacr.org/2012/507.pdf.

    Google Scholar 

  10. Identity and Data Protection Beat: The KECCAK Effect — What SHA-3 Brings to the Table, October, 2012, http://blogs.rsa.com/keccak-effect/.

  11. Antoine Joux, Florent Chabaud: Differential Collision in SHA-0, CRYPTO’ 98, 1998 http://fchabaud.free.fr/English/Publications/sha.pdf.

    MATH  Google Scholar 

  12. Elif Bilge Kavun, Tolga Yalcin: On the Suitability of SHA-3 Finalists for Leightweight Applications, Chair for Embedded Security, Bochum, Germany, 2012, http://csrc.nist.gov/groups/ST/hash/sha-3/Round3/March2012/documents/papers/KAVUN_paper.pdf

    Google Scholar 

  13. Stephane Manuel: Classification and generation of disturbance vectors for collision attacks against SHA-1, Designs, Codes and Cryptography, Volume 59,Issue 1–3, April 2011, Pages 247–263, http://eprint.iacr.org/2008/469.pdf.

    Article  MathSciNet  Google Scholar 

  14. Ralph Charles Merkle: Secrecy, Authentication, and Public Key Systems. Technical Report No. 1979-1, June 1979, Standford University http://www.merkle.com/papers/Thesis1979.pdf.

    MATH  Google Scholar 

  15. Christof Paar, Jan Pelzl: Understanding Cryptography — A Textbook for Students and Practitioners, Springer, 2010. [TuneKec]_http://keccak.noekeon.org/tune.html.

    MATH  Google Scholar 

  16. Rüdiger Weis, Stefan Lucks: Die dritte AES-Konferenz in New York. Datenschutz und Datensicherheit (DuD), 7/2000, S. 415–416.

    Google Scholar 

  17. Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongobo Yu: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, School of Mathematics and System Science, Shandong University, China, August 2004, http://eprint.iacr.org/2004/199.pdf.

    Google Scholar 

  18. Christopher Wolf, Erik Zenner: Zur Sicherheit von SHA-1. Datenschutz und Datensicherheit (DuD), 5/2005, S. 275–278.

    Google Scholar 

Download references

Authors

Additional information

M. SC. Pawel Swierczynski Wissenschaftlicher Mitarbeiter am Lehrstuhl Embedded Security, Ruhr-Universität Bochum (HGI).

Dr. Gregor Leander Postdoc am Lehrstuhl Embedded Security, Ruhr-Universität Bochum (HGI).

Prof. Dr.-Ing. Christof Paar Inhaber des Lehrstuhls für Embedded Security, Ruhr-Universität Bochum (HGI).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Swierczynski, P., Leander, G. & Paar, C. Keccak und der SHA-2. Datenschutz Datensich 37, 712–719 (2013). https://doi.org/10.1007/s11623-013-0299-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-013-0299-3

Navigation