Corpus ID: 2222603

The Road from Panama to Keccak via RadioGatún

@inproceedings{Bertoni2009TheRF,
  title={The Road from Panama to Keccak via RadioGat{\'u}n},
  author={G. Bertoni and J. Daemen and M. Peeters and G. V. Assche},
  booktitle={Symmetric Cryptography},
  year={2009}
}
  • G. Bertoni, J. Daemen, +1 author G. V. Assche
  • Published in Symmetric Cryptography 2009
  • Computer Science
  • In this paper, we explain the design choices of Panama (8) and RadioGat un (1), which lead to Keccak (3). After a brief recall of Panama, RadioGat un and the trail backtracking cost, we focus on three important aspects. First, we explain the role of the belt in the light of dierential trails. Second, we discuss the relative advantages of a block mode hash function compared to a stream mode one. Finally, we point out why Panama and RadioGat un are not sponge functions (2) and why their design… CONTINUE READING
    25 Citations

    Figures and Topics from this paper.

    Explore Further: Topics Discussed in This Paper

    Cryptanalysis of 2 Round Keccak-384
    • 2
    • PDF
    Cryptanalysis of 1-Round KECCAK
    • 2
    • PDF
    SPHINCS: Practical Stateless Hash-Based Signatures
    • 203
    • PDF
    mLSM: Making Authenticated Storage Faster in Ethereum
    • 12
    • PDF
    The PHOTON Family of Lightweight Hash Functions
    • 405
    • PDF

    References

    SHOWING 1-10 OF 13 REFERENCES
    Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques
    • 5
    • PDF
    Producing Collisions for Panama, Instantaneously
    • 12
    • PDF
    RadioGatún, a belt-and-mill hash function
    • 64
    • PDF
    Producing Collisions for PANAMA
    • 18
    • PDF
    On the Indifferentiability of the Sponge Construction
    • 351
    • PDF
    Fast Hashing and Stream Encryption with PANAMA
    • 97
    • PDF
    Analysis of the collision resistance of Radio- Gatún using algebraic techniques, Selected Areas in Cryptography
    • Lecture Notes in Computer Science
    • 2008
    Collision search attacks on SHA-1, Research summary
    • Collision search attacks on SHA-1, Research summary
    • 2005
    Keccak sponge function family main document
    • 255
    • PDF