keccak and sha 3 code and standard updates
play

Keccak and SHA-3: code and standard updates Guido Bertoni 1 Joan - PowerPoint PPT Presentation

Keccak and SHA-3: code and standard updates Guido Bertoni 1 Joan Daemen 1 Michal Peeters 2 Gilles Van Assche 1 Ronny Van Keer 1 1 STMicroelectronics 2 NXP Semiconductors FOSDEM 2015, Brussels, January 31st & February 1st, 2015 1 / 39


  1. Keccak and SHA-3: code and standard updates Guido Bertoni 1 Joan Daemen 1 Michaël Peeters 2 Gilles Van Assche 1 Ronny Van Keer 1 1 STMicroelectronics 2 NXP Semiconductors FOSDEM 2015, Brussels, January 31st & February 1st, 2015 1 / 39

  2. Outline 1 What is Keccak 2 NIST plans 3 The CAESAR competition 4 Keccak code package 2 / 39

  3. What is Keccak Outline 1 What is Keccak 2 NIST plans 3 The CAESAR competition 4 Keccak code package 3 / 39

  4. 0 1 n What is Keccak What is a hash function? #!/bin/ash notmagritte() { echo ”this is a ash function!” } This is not a hash function! h 0 1 This is a hash function! 4 / 39

  5. 0 1 n What is Keccak What is a hash function? #!/bin/ash notmagritte() { echo ”this is a ash function!” } This is not a hash function! h 0 1 This is a hash function! 4 / 39

  6. 0 1 n What is Keccak What is a hash function? #!/bin/ash notmagritte() { echo ”this is a ash function!” } This is not a hash function! h 0 1 This is a hash function! 4 / 39

  7. What is Keccak What is a hash function? #!/bin/ash notmagritte() { echo ”this is a ash function!” } This is not a hash function! This is a hash function! 4 / 39 h : { 0 , 1 } ∗ → { 0 , 1 } n I n O u t

  8. What is Keccak Cryptographic hash functions …and Keccak ? It is a (cryptographic) sponge function! 5 / 39 h : { 0 , 1 } ∗ → { 0 , 1 } n I n p u t me s s a g e D i g e s t MD5: n = 128 (Ron Rivest, 1992) SHA-1/2: n ∈ { 160 , 224 , 256 , 384 , 512 } (NSA, NIST, 1995-2001)

  9. What is Keccak Cryptographic sponge functions Keccak uses the permutation Keccak - f c bits of capacity (defines the security level) r bits of rate (defines the speed) Parameters More flexible than regular hash functions Arbitrary input and output length 6 / 39 Var.-length input Variable-length output r 0 f f … f f f … f c 0 absorbing squeezing

  10. What is Keccak Keccak - f in pseudo-code 7 / 39 K ECCAK - F [b](A) { forall i in 0…n r -1 A = Round[b](A, RC[i]) return A } Round[b](A,RC) { θ step C[x] = A[x,0] xor A[x,1] xor A[x,2] xor A[x,3] xor A[x,4], forall x in 0…4 D[x] = C[x-1] xor rot(C[x+1],1), forall x in 0…4 A[x,y] = A[x,y] xor D[x], forall (x,y) in (0…4,0…4) ρ and π steps B[y,2*x+3*y] = rot(A[x,y], r[x,y]), forall (x,y) in (0…4,0…4) χ step A[x,y] = B[x,y] xor ((not B[x+1,y]) and B[x+2,y]), forall (x,y) in (0…4,0…4) ι step A[0,0] = A[0,0] xor RC return A } 7 widths b ( = r + c ): 25, 50, 100, 200, 400, 800, and 1600 bits.

  11. What is Keccak 8 / 39 [eBASH, hydra6, http://bench.cr.yp.to/ ] Sponge tuning: capacity ⇒ security level Security 64 80 128 224 256 384 512 level Cost [bit] [cy/B] 20 cy/B Slower 15 cy/B 10 cy/B Faster 5 cy/B Capacity [bit] 128 160 256 448 512 768 1024 1600

  12. What is Keccak 8 / 39 [eBASH, hydra6, http://bench.cr.yp.to/ ] Sponge tuning: capacity ⇒ security level Security 64 80 128 224 256 384 512 level Cost [bit] [cy/B] 20 cy/B Slower 15 cy/B 10 cy/B Faster 5 cy/B Light- Script-kiddie Long-term Overkill Overkill / Insane weight Capacity [bit] 128 160 256 448 512 768 1024 1600

  13. What is Keccak 8 / 39 [eBASH, hydra6, http://bench.cr.yp.to/ ] Sponge tuning: capacity ⇒ security level Security 64 80 128 224 256 384 512 level Cost [bit] [cy/B] 20 cy/B Slower 15 cy/B 10 cy/B Keccak Faster 8 cy/B [b=1600] 5 cy/B Light- Script-kiddie Long-term Overkill Overkill / Insane weight Capacity [bit] 128 160 256 448 512 768 1024 1600

  14. What is Keccak 8 / 39 [eBASH, hydra6, http://bench.cr.yp.to/ ] Sponge tuning: capacity ⇒ security level Security 64 80 128 224 256 384 512 level Cost [bit] sha-256 [cy/B] 20 cy/B Slower 15 cy/B sha-512 10 cy/B Keccak Faster 8 cy/B [b=1600] L sha-1 L 5 cy/B md5 Light- Script-kiddie Long-term Overkill Overkill / Insane weight Capacity [bit] 128 160 256 448 512 768 1024 1600

  15. What is Keccak 9 / 39 [eBASH, hydra6, http://bench.cr.yp.to/ ] Keccak tuning: number of rounds ⇒ safety margin Cost sha-256 [cy/B] 20 cy/B Slower 15 cy/B sha-512 10 cy/B Faster L sha-1 5 cy/B L md5 Nr of rounds 2 4 6 6 8 10 12 14 16 18 20 22 24

  16. What is Keccak 9 / 39 [eBASH, hydra6, http://bench.cr.yp.to/ ] Keccak tuning: number of rounds ⇒ safety margin Cost sha-256 [cy/B] 20 cy/B Slower 15 cy/B sha-512 Keccak[c=256] 10 cy/B Faster 8 cy/B L sha-1 5 cy/B L md5 Nr of rounds 2 4 6 6 8 10 12 14 16 18 20 22 24

  17. What is Keccak 9 / 39 [eBASH, hydra6, http://bench.cr.yp.to/ ] Keccak tuning: number of rounds ⇒ safety margin Cost sha-256 [cy/B] 20 cy/B Practical attack Twilight zone No attack Slower 15 cy/B sha-512 Keccak[c=256] 10 cy/B Faster 8 cy/B L sha-1 5 cy/B L md5 Nr of rounds 2 4 6 8 10 11 12 14 16 18 20 22 24

  18. What is Keccak 9 / 39 [eBASH, hydra6, http://bench.cr.yp.to/ ] Keccak tuning: number of rounds ⇒ safety margin Cost sha-256 [cy/B] 20 cy/B Practical attack Twilight zone No attack Slower 15 cy/B sha-512 Keccak[c=256] 10 cy/B Faster 8 cy/B L sha-1 5 cy/B L md5 4 cy/B Keyak (single-pass authenticated encryption) Nr of rounds 2 4 6 8 10 11 12 14 16 18 20 22 24

  19. NIST plans Outline 1 What is Keccak 2 NIST plans 3 The CAESAR competition 4 Keccak code package 10 / 39

  20. NIST plans scope: stand-ins for all 4 SHA-2 [courtesy of C. De Cannière] The SHA-3 contest October 2012: Keccak = SHA-3 Summer 2008: start with 51 proposals response: 64 submissions method: public competition like AES 11 / 39 goal: FIPS standard November 2007: NIST announces SHA-2: serious doubts on foundations SHA-1: theoretically broken 2000-2006: crisis for standard hash function standards MD5: practically broken SHA-3 contest EDON-R BMW Sgàil LANE Grøstl Keccak ZK-Crypt Maraca NKS2D MD6 Hamsi MeshHash Waterfall StreamHash ECOH T wister Abacus EnRUPT WaMM Ponic MCSSHA3 AURORA Shabal LUX Skein SHAMATA CubeHash CRUNCH Cheetah DynamicSHA 2 Luffa Spectral Hash ECHO DCH Sarmal SIMD ESSENCE FSB SWIFFTX NaSHA ARIRANG Lesamnta Fugue SHAvite-3 Blender SANDstorm BLAKE HASH 2X T angle Vortex DynamicSHA BOOLE Khichidi-1 JH CHI TIB3 16/06/2009 2005 2006 2007 2008 2009 2010 2011 2012

  21. NIST plans The long road to the SHA-3 FIPS By Piet Musterd (flickr.com) February 2013: NIST- Keccak -team meeting SHA-2 replacement by now less urgent …but Keccak is more than just hashing! NIST disseminates joint SHA-3 proposal Summer 2013: Snowden revelations alleged NSA back door in DUAL EC DRBG SHA-3 proposal framed as “NIST weakening Keccak ” Early 2014: standard takes shape addressing public concerns Friday, April 4, 2014: draft FIPS 202 for public comments August 2014: NIST announces plans at SHA-3 conference Mid 2015 (expected): FIPS 202 official 12 / 39

  22. NIST plans FIPS 202: what is inside? By Nicole Doherty (flickr.com) Content Keccak instances for 4 hash functions 2 XOFs Keccak - f all 7 block widths even reduced-round versions unlike AES FIPS that has only 1 of the 5 Rijndael widths sponge construction Concept: toolbox for building other functions tree hashing, MAC, encryption, … dedicated special publications (NIST SP 800-XX) under development http://csrc.nist.gov/groups/ST/hash/sha-3/Aug2014/index.html 13 / 39

  23. NIST plans XOF: eXtendable Output Function “XOF: a function in which the output can be extended to any length.” Good for full domain hash, stream ciphers and key derivation [Ray Perlner, SHA 3 workshop 2014] Quite natural for sponge keeps state and delivers more output upon request bits of output do not depend on the number of bits requested Allows simplification: instead of separate hash functions per output length a single XOF can cover all use cases: 14 / 39 H-256 ( M ) = ⌊ XOF ( M ) ⌋ 256

  24. NIST plans Domain separation By Adam Fagen (flickr.com) Some protocols and applications need multiple hash functions or XOFs that should be independent With a single XOF? Yes: using domain separation …unless XOF has a cryptographic weakness Variable-length diversifiers: suffix-free set of strings 15 / 39 output of XOF ( M || 0 ) and XOF ( M || 1 ) are independent Generalization to 2 n functions with D an n -bit diversifier XOF D ( M ) = XOF ( M || D )

  25. NIST plans The XOFs and hash functions in FIPS 202 Four drop-in replacements identical to those in Keccak submission Two extendable output functions (XOF) Tree-hashing ready: Sakura coding [Keccak team, ePrint 2013/231] XOF SHA-2 drop-in replacements SHAKE128 and SHAKE256 SHA3-224 to SHA3-512 16 / 39 Keccak [ c = 256 ]( M || 11 || 11 ) ⌊ Keccak [ c = 448 ]( M || 01 ) ⌋ 224 Keccak [ c = 512 ]( M || 11 || 11 ) ⌊ Keccak [ c = 512 ]( M || 01 ) ⌋ 256 ⌊ Keccak [ c = 768 ]( M || 01 ) ⌋ 384 ⌊ Keccak [ c = 1024 ]( M || 01 ) ⌋ 512

  26. NIST plans Tree hashing CPU: Haswell with AVX2 256-bit SIMD 2.87 AVX2 5.30 AVX2 (128-bit only) 7.70 x86_64 cycles/byte instruction function performance: peer-to-peer applications: Gnutella, BitTorrent etc. hash recomputation when modifying small part of file Features: 17 / 39 Keccak [ c = 256 ] × 1 Keccak [ c = 256 ] × 2 Keccak [ c = 256 ] × 4

Recommend


More recommend