27 March 2013 Brussels, Belgium

Joan Daemen
STMicroelectronics

Permutation-based cryptography

Permutation-based cryptographyKeccak has at its core a fixed-length permutation and makes use of the sponge construction. In this presentation we will show that—with its variable output length and soundness proof—the sponge construction can be used for more than just hashing. This includes stream encryption, MAC computation and use as a mask generating function. The duplex construction, whose security is equivalent to the that of the sponge construction, additionally supports efficient authenticated encryption and reseedable pseudorandom sequence generation. The modes built on top of the sponge and duplex constructions are simpler than the traditional block cipher modes and offer at the same time more flexibility.



[Slides]