Поддерживать
www.wikidata.ru-ru.nina.az
SHA 3 Keccak proiznositsya kak kechak algoritm heshirovaniya peremennoj razryadnosti razrabotannyj gruppoj avtorov vo glave s Joanom Dajmenom soavtorom Rijndael avtorom shifrov MMB SHARK Noekeon SQUARE i BaseKing 2 oktyabrya 2012 goda Keccak stal pobeditelem konkursa kriptograficheskih algoritmov provodimogo Nacionalnym institutom standartov i tehnologij SShA 5 avgusta 2015 goda algoritm utverzhdyon i opublikovan v kachestve standarta FIPS 202 V programmnoj realizacii avtory zayavlyayut o 12 5 ciklah na bajt pri vypolnenii na PK s processorom Intel Core 2 Odnako v apparatnyh realizaciyah Keccak okazalsya namnogo bystree chem vse drugie finalisty SHA 3 KeccakRazrabotchiki Gvido Bertoni Joan Dajmen Mikael Piters Zhil Van AsheSozdan 2008Opublikovan 2008Predshestvennik SHA 2Razmer hesha 224 256 384 512 peremennyj 0 lt d 264 1 Chislo raundov 24 po umolchaniyu Tip hesh funkciyaKonstrukciya funkcii gubki ispolzovannaya v hesh funkcii Pi vhodnye bloki Zj vyhod algoritma Razmer c capacity neispolzuemogo dlya vyvoda nabora bitov dolzhen byt znachitelnym dlya dostizheniya ustojchivosti k atakam Algoritm SHA 3 postroen po principu kriptograficheskoj gubki dannaya struktura kriptograficheskih algoritmov byla predlozhena avtorami algoritma Keccak ranee IstoriyaV 2004 2005 godah neskolko algoritmov heshirovaniya byli atakovany v tom chisle byli opublikovany sereznye ataki protiv algoritma SHA 1 utverzhdennogo Nacionalnym institutom standartov i tehnologij NIST V otvet NIST provel otkrytye seminary i 2 noyabrya 2007 goda anonsiroval konkurs na razrabotku novogo algoritma heshirovaniya 2 oktyabrya 2012 goda pobeditelem konkursa stal algoritm Keccak i byl standartizovan kak novyj algoritm SHA 3 5 avgusta 2015 goda algoritm utverzhden i opublikovan v kachestve standarta FIPS 202 Algoritm byl razrabotan angl Joanom Dajmenom angl iz STMicroelectronics i angl iz NXP Algoritm osnovan na bolee rannih hesh funkciyah Panama i RadioGatun Panama byl razrabotan Dajmenom i Krejgom Kleppom v 1998 godu RadioGatun byl realizovan na osnove Panama Dajmenom Pitersom i Van Ashe v 2006 godu V hode konkursa konkursantam razreshalos vnosit izmeneniya v svoj algoritm dlya ispravleniya obnaruzhivayushihsya problem Izmeneniya vnesennye v algoritm Keccak Kolichestvo raundov bylo uvelicheno s 12 l displaystyle l do 12 2l displaystyle l Padding byl izmenyon so slozhnoj formy na bolee prostuyu opisannuyu nizhe Skorost rate r byla uvelichena do predela bezopasnosti ranee okruglyalas vniz do blizhajshej stepeni 2 AlgoritmHesh funkcii semejstva SHA 3 postroeny na osnove konstrukcii kriptograficheskoj gubki v kotoroj dannye snachala vpityvayutsya v gubku pri kotorom ishodnoe soobshenie M displaystyle M podvergaetsya mnogoraundovym perestanovkam f displaystyle f zatem rezultat Z displaystyle Z otzhimaetsya iz gubki Na etape vpityvaniya bloki soobsheniya summiruyutsya po modulyu 2 s podmnozhestvom sostoyaniya posle chego vsyo sostoyanie preobrazuetsya s pomoshyu funkcii perestanovki f displaystyle f Na etape otzhimaniya vyhodnye bloki schityvayutsya iz odnogo i togo zhe podmnozhestva sostoyaniya izmenyonnogo funkciej perestanovok f displaystyle f Razmer chasti sostoyaniya kotoryj zapisyvaetsya i schityvaetsya nazyvaetsya skorostyu angl rate i oboznachaetsya r displaystyle r a razmer chasti kotoraya netronuta vvodom vyvodom nazyvaetsya yomkostyu angl capacity i oboznachaetsya c displaystyle c Algoritm polucheniya znacheniya hesh funkcii mozhno razdelit na neskolko etapov Ishodnoe soobshenie M displaystyle M dopolnyaetsya do stroki P displaystyle P dliny kratnoj r displaystyle r s pomoshyu funkcii dopolneniya pad funkcii Stroka P displaystyle P delitsya na n displaystyle n blokov dliny r displaystyle r P0 P1 Pn 1 displaystyle P 0 P 1 P n 1 Vpityvanie kazhdyj blok Pi displaystyle P i dopolnyaetsya nulyami do stroki dliny b displaystyle b bit i summiruetsya po modulyu 2 so strokoj sostoyaniya S displaystyle S gde S displaystyle S stroka dliny b displaystyle b bit b displaystyle b r displaystyle r c displaystyle c Pered nachalom raboty funkcii vse elementy S displaystyle S ravny nulyu Dlya kazhdogo sleduyushego bloka sostoyanie stroka poluchennaya primeneniem funkcii perestanovok f displaystyle f k rezultatu predydushego shaga Otzhimanie poka dlina Z displaystyle Z menshe d displaystyle d d displaystyle d kolichestvo bit v rezultate hesh funkcii k Z displaystyle Z dobavlyaetsya r displaystyle r pervyh bit sostoyaniya S displaystyle S posle kazhdogo pribavleniya k S displaystyle S primenyaetsya funkciya perestanovok f displaystyle f Zatem Z displaystyle Z obrezaetsya do dliny d displaystyle d bit Stroka Z displaystyle Z dliny d displaystyle d bit vozvrashaetsya v kachestve rezultata Blagodarya tomu chto sostoyanie soderzhit c displaystyle c dopolnitelnyh bit algoritm ustojchiv k atake udlineniem soobsheniya k kotoroj vospriimchivy algoritmy SHA 1 i SHA 2 V SHA 3 sostoyanie S displaystyle S eto massiv 5 5 slov dlinoj w displaystyle w 64 bita vsego 5 5 64 1600 bit Takzhe v Keccak mogut ispolzovatsya dliny w displaystyle w ravnye menshim stepenyam 2 ot w displaystyle w 1 do w displaystyle w 32 DopolnenieDlya togo chtoby ishodnoe soobshenie M mozhno bylo razdelit na bloki dliny r neobhodimo dopolnenie V SHA 3 ispolzuetsya pattern pad10 1 k soobsheniyu dobavlyaetsya 1 posle nego 0 ili bolshe nulevyh bitov do r 1 v konce 1 r 1 nulevyh bitov mozhet byt dobavleno kogda poslednij blok soobsheniya imeet dlinu r 1 bit Etot blok dopolnyaetsya edinicej sleduyushij blok budet sostoyat iz r 1 nulej i edinicy Dva edinichnyh bita dobavlyayutsya i v tom sluchae esli dlina ishodnogo soobsheniya M delitsya na r V etom sluchae k soobsheniyu dobavlyaetsya blok nachinayushijsya i okanchivayushijsya edinicami mezhdu kotorymi r 2 nulevyh bitov Eto neobhodimo dlya togo chtoby dlya soobsheniya okanchivayushegosya posledovatelnostyu bitov kak v funkcii dopolneniya i dlya soobsheniya bez etih bitov znacheniya hesh funkcii byli razlichny Pervyj edinichnyj bit neobhodim dlya togo chtoby rezultaty hesh funkcii ot soobshenij razlichayushihsya neskolkimi nulevymi bitami v konce byli razlichny Funkciya perestanovokFunkciya perestanovok ispolzuemaya v SHA 3 vklyuchaet v sebya isklyuchayushee ILI XOR pobitovoe I AND i pobitovoe otricanie NOT Funkciya opredelena dlya strok dliny stepeni 2 w 2l displaystyle w 2 l V osnovnoj realizacii SHA 3 w 64 displaystyle w 64 l 6 displaystyle l 6 Sostoyanie S displaystyle S mozhno predstavit v vide tryohmernogo massiva A displaystyle A razmerom 5 5 w displaystyle w Togda element massiva A i j k displaystyle A i j k eto 5i j w k displaystyle 5i j times w k bit stroki sostoyaniya S displaystyle S Funkciya soderzhit neskolko shagov 8 displaystyle theta r displaystyle rho p displaystyle pi x displaystyle chi i displaystyle iota kotorye vypolnyayutsya neskolko raundov Na kazhdom shage oboznachim vhodnoj massiv A vyhodnoj massiv A Shag 8 displaystyle theta Dlya vseh i displaystyle i i k displaystyle k takih chto 0 i lt 5 displaystyle 0 leqslant i lt 5 0 k lt w displaystyle 0 leqslant k lt w polozhim C i k A i 0 k A i 1 k A i 2 k A i 3 k A i 4 k displaystyle C i k A i 0 k oplus A i 1 k oplus A i 2 k oplus A i 3 k oplus A i 4 k D i k C i 1 mod5 k C i 1 mod5 k 1 modw displaystyle D i k C i 1 bmod 5 k oplus C i 1 bmod 5 k 1 bmod w Dlya vseh i j k displaystyle i j k takih chto 0 i lt 5 displaystyle 0 leqslant i lt 5 0 j lt 5 displaystyle 0 leqslant j lt 5 0 k lt w displaystyle 0 leqslant k lt w A i j k A i j k D i k displaystyle A i j k A i j k oplus D i k Shag r displaystyle rho Dlya vseh k displaystyle k takih chto 0 k lt w displaystyle 0 leqslant k lt w A 0 0 k A 0 0 k displaystyle A 0 0 k A 0 0 k Pust v nachale i j 1 0 displaystyle i j 1 0 Dlya t displaystyle t ot 0 do 23 Dlya vseh k displaystyle k takih chto 0 k lt w displaystyle 0 leqslant k lt w A i j k A i j k t 1 t 2 2 modw displaystyle A i j k A i j k t 1 t 2 2 bmod w i j j 2i 3j mod5 displaystyle i j j 2i 3j bmod 5 Shag p displaystyle pi Dlya vseh i j k displaystyle i j k takih chto 0 i lt 5 displaystyle 0 leqslant i lt 5 0 j lt 5 displaystyle 0 leqslant j lt 5 0 k lt w displaystyle 0 leqslant k lt w A i j k A i 3j mod5 i k displaystyle A i j k A i 3j bmod 5 i k Shag x displaystyle chi Dlya vseh i j k displaystyle i j k takih chto 0 i lt 5 displaystyle 0 leqslant i lt 5 0 j lt 5 displaystyle 0 leqslant j lt 5 A i j k A i j k A i 1 mod5 j k 1 A i 2 mod5 j k displaystyle A i j k A i j k oplus A i 1 bmod 5 j k oplus 1 cdot A i 2 bmod 5 j k Shag i displaystyle iota Vvedem dopolnitelnuyu funkciyu rc t displaystyle rc t gde vhod celoe chislo t displaystyle t a na vyhode bit Algoritm rc t displaystyle rc t Esli tmod255 0 displaystyle t bmod 2 55 0 to vozvrashaetsya 1 Pust R 10000000 displaystyle R 10000000 Dlya i ot 1 do t mod 255 R 0 R R 0 R 0 R 8 displaystyle R 0 R 0 oplus R 8 R 4 R 4 R 8 displaystyle R 4 R 4 oplus R 8 R 5 R 5 R 8 displaystyle R 5 R 5 oplus R 8 R 6 R 6 R 8 displaystyle R 6 R 6 oplus R 8 R Trunc8 R displaystyle R Trunc 8 R Vozvrashaetsya R 0 displaystyle R 0 displaystyle Algoritm i A ir displaystyle iota A i r ir displaystyle i r nomer raunda Dlya vseh i j k displaystyle i j k takih chto 0 i lt 5 displaystyle 0 leqslant i lt 5 0 j lt 5 displaystyle 0 leqslant j lt 5 0 k lt w displaystyle 0 leqslant k lt w A i j k A i j k displaystyle A i j k A i j k Pust RC displaystyle RC massiv dliny w displaystyle w zapolnennyj nulyami Dlya i displaystyle i ot 0 do l displaystyle l RC 2i 1 rc i 7ir displaystyle RC 2 i 1 rc i 7i r Dlya vseh k displaystyle k takih chto 0 k lt w displaystyle 0 leqslant k lt w A 0 0 k A 0 0 k RC k displaystyle A 0 0 k A 0 0 k oplus RC k Algoritm perestanovok Perevod stroki S displaystyle S v massiv A displaystyle A Dlya ir displaystyle i r ot 12 2l nr displaystyle 12 2l n r do 12 2l 1 displaystyle 12 2l 1 A i x p r 8 A ir displaystyle A iota chi pi rho theta A i r Perevod massiva A displaystyle A v stroku S displaystyle S dliny b displaystyle b Heshirovanie soobshenij proizvolnoj dlinyOsnovoj funkcii szhatiya algoritma yavlyaetsya funkciya f vypolnyayushaya peremeshivanie vnutrennego sostoyaniya algoritma Sostoyanie oboznachim ego A predstavlyaetsya v vide massiva 5 5 elementami kotorogo yavlyayutsya 64 bitnye slova inicializirovannye nulevymi bitami to est razmer sostoyaniya sostavlyaet 1600 bitov Funkciya f vypolnyaet 24 raunda v kazhdom iz kotoryh proizvodyatsya sleduyushie dejstviya C x A x 0 displaystyle oplus A x 1 displaystyle oplus A x 2 displaystyle oplus A x 3 displaystyle oplus A x 4 x 0 4 D x C x 1 displaystyle oplus S x 1 gt gt gt 1 x 0 4 A x y A x y displaystyle oplus D x x 0 4 y 0 4 B y 2x 3y A x y gt gt gt r x y x 0 4 y 0 4 A x y B x y displaystyle oplus B x 1 y amp B x 2 y x 0 4 y 0 4 Gde B vremennyj massiv analogichnyj po strukture massivu sostoyaniya C i D vremennye massivy soderzhashie po pyat 64 bitnyh slov r massiv opredelyayushij velichinu ciklicheskogo sdviga dlya kazhdogo slova sostoyaniya x porazryadnoe dopolnenie k x i operacii s indeksami massiva vypolnyayutsya po modulyu 5 Krome privedennyh vyshe operacij v kazhdom raunde takzhe vypolnyaetsya nalozhenie operaciej XOR raundovoj konstanty na slovo A 0 0 Pered vypolneniem funkcii szhimaniya nakladyvaetsya operaciya XOR fragmentov ishodnogo soobsheniya s fragmentami ishodnogo sostoyaniya Rezultat obrabatyvaetsya funkciej f Dannoe nalozhenie v sovokupnosti s funkciej szhimaniya vypolnyaemye dlya kazhdogo bloka vhodnyh dannyh predstavlyayut soboj vpityvayushuyu absorbing fazu kriptograficheskoj gubki Stoit otmetit chto funkciya f ispolzuet tolko operacii stojkie k atakam ispolzuyushim utechki dannyh po pobochnym kanalam Rezultiruyushee hesh znachenie vychislyaetsya v processe vypolneniya vyzhimayushej squeezing fazy kriptograficheskoj gubki osnovu kotoroj takzhe sostavlyaet opisannaya vyshe funkciya f Vozmozhnye razmery hesh znachenij 224 256 384 i 512 bit NastrojkiOriginalnyj algoritm Keccak imeet mnozhestvo nastraivaemyh parametrov s celyu obespecheniya optimalnogo sootnosheniya kriptostojkosti i bystrodejstviya dlya opredelyonnogo primeneniya algoritma na opredelyonnoj platforme Nastraivaemymi velichinami yavlyayutsya razmer bloka dannyh razmer sostoyaniya algoritma kolichestvo raundov v funkcii f i drugie Na protyazheniya konkursa heshirovaniya Nacionalnogo instituta standartov i tehnologij uchastniki imeli pravo nastraivat svoi algoritmy dlya resheniya voznikshih problem Tak byli vneseny nekotorye izmeneniya v Keccak kolichestvo raundov bylo uvelicheno s 18 do 24 s celyu uvelicheniya zapasa bezopasnosti Avtory Keccak uchredili ryad prizov za dostizheniya v kriptoanalize dannogo algoritma Versiya algoritma prinyataya v kachestve okonchatelnogo standarta SHA 3 imeet neskolko neznachitelnyh otlichij ot originalnogo predlozheniya Keccak na konkurs V chastnosti byli ogranicheny nekotorye parametry otbrosheny medlennye rezhimy c 768 i c 1024 v tom chisle dlya uvelicheniya proizvoditelnosti Takzhe v standarte byli vvedeny funkcii s udlinyaemym rezultatom XOF Extendable Output Functions SHAKE128 i SHAKE256 dlya chego heshiruemoe soobshenie stalo neobhodimo dopolnyat suffiksom iz 2 ili 4 bit v zavisimosti ot tipa funkcii Funkciya FormulaSHA3 224 M Keccak 448 M 01 224 SHA3 256 M Keccak 512 M 01 256 SHA3 384 M Keccak 768 M 01 384 SHA3 512 M Keccak 1024 M 01 512 SHAKE128 M d Keccak 256 M 1111 d SHAKE256 M d Keccak 512 M 1111 d Dopolnitelnye funkciiV dekabre 2016 goda Nacionalnyj institut standartov i tehnologij SShA opublikoval novyj dokument NIST SP 800 185 opisyvayushij dopolnitelnye funkcii na osnove SHA 3 Funkciya OpisaniecSHAKE128 X L N S Parametrizovannaya versiya SHAKEcSHAKE256 X L N S KMAC128 K X L S Imitovstavka na osnove KeccakKMAC256 K X L S KMACXOF128 K X L S KMACXOF256 K X L S TupleHash128 X L S Heshirovanie kortezha strokTupleHash256 X L S TupleHashXOF128 X L S TupleHashXOF256 X L S ParallelHash128 X B L S Parallelizuemaya hesh funkciya na osnove KeccakParallelHash256 X B L S ParallelHashXOF128 X B L S ParallelHashXOF256 X B L S Testovye vektoryZnacheniya raznyh variantov hesha ot pustoj stroki SHA3 224 6b4e03423667dbb73b6e15454f0eb1abd4597f9a1b078e3f5b5a6bc7 SHA3 256 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a SHA3 384 0c63a75b845e4f7d01107d852e4c2485c51a50aaaa94fc61995e71bbee983a2ac3713831264adb47fb6bd1e058d5f004 SHA3 512 a69f73cca23a9ac5c8b567dc185a756e97c982164fe25859e0d1dcc1475c80a615b2123af1f5f94c11e3e9402c3ac558f500199d95b6d3e301758586281dcd26 SHAKE128 256 7f9c2ba4e88f827d616045507605853ed73b8093f6efbc88eb1a6eacfa66ef26 SHAKE256 512 46b9dd2b0ba88d13233b3feb743eeb243fcd52ea62b81b82b50c27646ed5762fd75dc4ddd8c0f200cb05019d67b592f6fc821c49479ab48640292eacb3b7c4be Maloe izmenenie soobsheniya privodit k znachitelnym izmeneniyam v znachenii hesh funkcii blagodarya lavinnomu effektu kak pokazano v sleduyushih primerah SHA3 224 The quick brown fox jumps over the lazy dog d15dadceaa4d5d7bb3b48f446421d542e08ad8887305e28d58335795 SHA3 224 The quick brown fox jumps over the lazy dog 2d0708903833afabdd232a20201176e8b58c5be8a6fe74265ac54db0 SHA3 256 The quick brown fox jumps over the lazy dog 69070dda01975c8c120c3aada1b282394e7f032fa9cf32f4cb2259a0897dfc04 SHA3 256 The quick brown fox jumps over the lazy dog a80f839cd4f83f6c3dafc87feae470045e4eb0d366397d5c6ce34ba1739f734d SHA3 384 The quick brown fox jumps over the lazy dog 7063465e08a93bce31cd89d2e3ca8f602498696e253592ed26f07bf7e703cf328581e1471a7ba7ab119b1a9ebdf8be41 SHA3 384 The quick brown fox jumps over the lazy dog 1a34d81695b622df178bc74df7124fe12fac0f64ba5250b78b99c1273d4b080168e10652894ecad5f1f4d5b965437fb9 SHA3 512 The quick brown fox jumps over the lazy dog 01dedd5de4ef14642445ba5f5b97c15e47b9ad931326e4b0727cd94cefc44fff23f07bf543139939b49128caf436dc1bdee54fcb24023a08d9403f9b4bf0d450 SHA3 512 The quick brown fox jumps over the lazy dog 18f4f4bd419603f95538837003d9d254c26c23765565162247483f65c50303597bc9ce4d289f21d1c2f1f458828e33dc442100331b35e7eb031b5d38ba6460f8 SHAKE128 The quick brown fox jumps over the lazy dog 256 f4202e3c5852f9182a0430fd8144f0a74b95e7417ecae17db0f8cfeed0e3e66e SHAKE128 The quick brown fox jumps over the lazy dof 256 853f4538be0db9621a6cea659a06c1107b1f83f02b13d18297bd39d7411cf10cKriptoanalizRezultaty kriptoanaliza vo vremya konkursa Cel Tip ataki Vyhod Variant CF Call PamyatHesh funkciya Kolliziya 160 r 240 640 1440 c 160 1 2 raundaHesh funkciya Nahozhdenie proobraza 80 r 240 640 1440 c 160 1 2 raundaPerestanovki Ataka razlichitel Vse 24 raunda 21579 displaystyle 2 1579 Perestanovki Differencialnoe svojstvo Vse 8 raundov 2491 47 displaystyle 2 491 47 Hesh funkciya Ataka razlichitel 224 256 4 raunda 225 displaystyle 2 25 Hesh funkciya Kolliziya 224 256 2 raunda 233 displaystyle 2 33 Hesh funkciya Nahozhdenie vtorogo proobraza 224 256 2 raunda 233 displaystyle 2 33 229 displaystyle 2 29 Hesh funkciya Nahozhdenie vtorogo proobraza 512 6 raundov 2506 displaystyle 2 506 2176 displaystyle 2 176 Hesh funkciya Nahozhdenie vtorogo proobraza 512 7 raundov 2507 displaystyle 2 507 2320 displaystyle 2 320 Hesh funkciya Nahozhdenie vtorogo proobraza 512 8 raundov 2511 5 displaystyle 2 511 5 2508 displaystyle 2 508 Hesh funkciya Kolliziya 224 256 4 raundaPrimechaniyaNIST Selects Winner of Secure Hash Algorithm SHA 3 Competition neopr Data obrasheniya 3 oktyabrya 2012 5 oktyabrya 2012 goda NIST Releases SHA 3 Cryptographic Hash Standard neopr Data obrasheniya 21 yanvarya 2016 17 avgusta 2015 goda NIST Manuscript Publication Search neopr Data obrasheniya 21 yanvarya 2016 12 avgusta 2015 goda Shu jen Chang Ray Perlner William E Burr Meltem Sonmez Turan John M Kelsey Third Round Report of the SHA 3 Cryptographic Hash Algorithm Competition doi 10 6028 nist ir 7896 Keccak Team angl keccak team Data obrasheniya 15 dekabrya 2017 16 dekabrya 2017 goda SHA 3 Project Hash Functions CSRC neopr csrc nist gov Data obrasheniya 7 noyabrya 2017 20 noyabrya 2017 goda NIST Selects Winner of Secure Hash Algorithm SHA 3 Competition neopr NIST 2 oktyabrya 2012 Data obrasheniya 2 oktyabrya 2012 30 aprelya 2017 goda Guido Bertoni Joan Daemen Michael Peeters Gilles Van Assche The Road from Panama to Keccak via RadioGatun Symmetric Cryptography Helena Handschuh Stefan Lucks Bart Preneel Phillip Rogaway Dagstuhl Germany Schloss Dagstuhl Leibniz Zentrum fuer Informatik Germany 2009 22 dekabrya 2017 goda Keccak Team angl keccak team Data obrasheniya 12 noyabrya 2017 13 noyabrya 2017 goda Keccak Team angl keccak team Data obrasheniya 12 noyabrya 2017 13 noyabrya 2017 goda Morris J Dworkin SHA 3 Standard Permutation Based Hash and Extendable Output Functions doi 10 6028 nist fips 202 Will Keccak SHA 3 neopr 1 oktyabrya 2013 Data obrasheniya 20 dekabrya 2013 30 yanvarya 2014 goda What the heck is going on with NIST s cryptographic standard SHA 3 angl 2013 09 24 25 yanvarya 2014 Data obrasheniya 20 dekabrya 2013 Yes this is Keccak neopr 4 oktyabrya 2013 Data obrasheniya 20 dekabrya 2013 8 dekabrya 2013 goda otvetnoe zayavlenie ot avtorov Keccak The Keccak sponge function family neopr 17 yanvarya 2011 Data obrasheniya 30 sentyabrya 2015 12 sentyabrya 2015 goda izmenenie algoritma zapolneniya v 3 m raunde konkursa SHA 3 Derived Functions cSHAKE KMAC TupleHash and ParallelHash neopr Data obrasheniya 31 oktyabrya 2017 31 oktyabrya 2017 goda SsylkiNIST Selects Winner of Secure Hash Algorithm SHA 3 Competition ot 5 oktyabrya 2012 na Wayback Machine NIST October 2012 angl The Keccak sponge function family ot 12 oktyabrya 2016 na Wayback Machine Sajt Noekeon 2015 10 15 Oficialnaya stranica hesh funkcii Keccak angl Hesh funkciya Keccak i konstrukciya Sponge kak universalnyj kriptoprimitiv ot 23 iyunya 2013 na Wayback Machine pgpru com 2010 2013 perevod materiala s noekon org SHA 3 Standard Permutation Based Hash and Extendable Output Functions NIST ot 17 sentyabrya 2017 na Wayback Machine angl Realizacii Software resources angl https keccak team The Keccak team Data obrasheniya 6 dekabrya 2017 7 dekabrya 2017 goda Java implementation PitayaV drugom yazykovom razdele est bolee polnaya statya SHA 3 angl Vy mozhete pomoch proektu rasshiriv tekushuyu statyu s pomoshyu perevoda
Вершина