[147525] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Sha3

daemon@ATHENA.MIT.EDU (Ben Laurie)
Sun Oct 6 10:06:18 2013

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <C39FE55F-76C1-4DA2-8E28-A4042DFF7B55@mac.com>
Date: Sat, 5 Oct 2013 23:12:46 +0100
From: Ben Laurie <ben@links.org>
To: james hughes <hughejp@mac.com>
Cc: John Kelsey <crypto.jmk@gmail.com>,
	"cryptography@metzdowd.com List" <cryptography@metzdowd.com>,
	David Johnston <dj@deadhat.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 5 October 2013 20:18, james hughes <hughejp@mac.com> wrote:
> On Oct 5, 2013, at 12:00 PM, John Kelsey <crypto.jmk@gmail.com> wrote:
>
>> http://keccak.noekeon.org/yes_this_is_keccak.html
>
> From the authors: "NIST's current proposal for SHA-3 is a subset of the K=
eccak family", "one can generate the test vectors for that proposal using t=
he Kecca kreference code." and this "shows that the [SHA-3] cannot contain =
internal changes to the algorithm."
>
> The process of setting the parameters is an important step in standardiza=
tion. NIST has done this and the authors state that this has not crippled t=
he algorithm.
>
> I bet this revelation does not make it to Slashdot=85
>
> Can we put this to bed now?

I have to take issue with this:

"The security is not reduced by adding these suffixes, as this is only
restricting the input space compared to the original Keccak. If there
is no security problem on Keccak(M), there is no security problem on
Keccak(M|suffix), as the latter is included in the former."

I could equally argue, to take an extreme example:

"The security is not reduced by adding these suffixes, as this is only
restricting the input space compared to the original Keccak. If there
is no security problem on Keccak(M), there is no security problem on
Keccak(preimages of Keccak(42)), as the latter is included in the
former."

In other words, I have to also make an argument about the nature of
the suffix and how it can't have been chosen s.t. it influences the
output in a useful way.

I suspect I should agree with the conclusion, but I can't agree with
the reasoning.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post