SHA-3, Keccak and SHAKE (Sponge Function)

Sdílet
Vložit
  • čas přidán 12. 06. 2019
  • asecuritysite.com/hash/s3
    asecuritysite.com/hash/gokang
    asecuritysite.com/hash/goshake
    Article:
    medium.com/asecuritysite-when...

Komentáře • 25

  • @pakoti96
    @pakoti96 Před 4 lety +9

    Great explanation.
    It makes sense now why they call it "Sponge", "Absorb" and "Squeeze"!

  • @vivek73
    @vivek73 Před 2 lety +3

    Thank you very much Bill, I was getting super confused on what would be the starting values of r and c, which you explained were zero. That cleared it up for me. I saw so many videos for sha3 but none have explained the starting values of r and c as clearly as you have. This video cleared all doubts I had on how sha3 works.

  • @MuscleTeamOfficial
    @MuscleTeamOfficial Před 2 měsíci

    thank you for making this available to us plebs Bill

  • @junghyunkim2247
    @junghyunkim2247 Před 6 měsíci

    Superb explanation.

  • @abo-alhosam3146
    @abo-alhosam3146 Před 2 lety

    Very brief, to the point, easy to be understood explanation + saved my time. Many thanks professor

  • @jakubkosuth1512
    @jakubkosuth1512 Před 4 lety +2

    Great work, you helped me to understand keccak.

  • @fuadhossainoni7409
    @fuadhossainoni7409 Před 4 lety

    this helped me a lot, thank you

  • @bollamebendrikb1923
    @bollamebendrikb1923 Před 9 měsíci

    Thank you.

  • @alexpetrov9911
    @alexpetrov9911 Před 2 lety

    Thanks ​ @Bill Buchanan OBE ! you did amazing and useful analysis !

  • @user-vp3lq7rg7m
    @user-vp3lq7rg7m Před 2 lety

    Awesome explanation. Thank you.

  • @CasualInventor
    @CasualInventor Před 4 lety

    I've been reading "FIPS PUB 202" specification because I am attempting to implement SHA3 in Ada 2012 and a question arises that I cannot find an answer to in the spec... At what point does the value of "b" need to be decided? My implementation is almost finished but for this small detail. It's been a fascinating exercise, working through a difficult programming task in a language I'm not familiar with.

  • @hijameorihan5140
    @hijameorihan5140 Před 3 lety

    Thank you sir !

  • @binaychaurel4274
    @binaychaurel4274 Před 2 lety

    Great explanation.

  • @pakoti96
    @pakoti96 Před 4 lety +1

    The only thing I didn't understand is what is the purpose of c?

  • @reaganrodrigues7451
    @reaganrodrigues7451 Před 2 lety

    Thanks

  • @sivas8611
    @sivas8611 Před rokem

    Thanks sir

  • @adnantatlis6791
    @adnantatlis6791 Před rokem

    hello mr bill... i need ur answer
    can we get hash of massage of etherume rawtx
    as we do for bitcoin???

  • @pkenllure4375
    @pkenllure4375 Před 4 lety

    Why is only the "rate" portion of the state used as output?

  • @sunnsunn9127
    @sunnsunn9127 Před 3 lety

    What is weakness of sha 2 ? My mind very weak

    • @alexpetrov9911
      @alexpetrov9911 Před 2 lety

      more rounds(64), but worst results, higher change of collision, higher complexity of implementations, less speed/performance.

  • @kornelijekovac9793
    @kornelijekovac9793 Před 4 lety

    Why are collisions important? It's not like you can get the same hash as original with a fake and meaningful document? It's almost certain it's gonna be a bunch of nonsense?

    • @BillBuchanan
      @BillBuchanan  Před 4 lety +5

      In MD5 (128-bit hash), it is possible to create valid images and documents with the same hash. It has been shown to be possible with SHA-1, too. There are tools which can easily create a fake program with a valid MD5 hash using the Birthday Attack.

    • @kornelijekovac9793
      @kornelijekovac9793 Před 4 lety

      @@BillBuchanan Oh, I wasn't aware we were there yet. Thanks for the info.

  • @Djdjos8533
    @Djdjos8533 Před 3 lety

    Какой нахер Кесак и sha...ETHhash

    • @alexpetrov9911
      @alexpetrov9911 Před 2 lety

      Вы похоже совсем не поняли о чем он ? sha3/keccak безопаснее и быстрее чем sha256, имеет большую пропускную способность и лучшее мат распределение как hash функция, меньше операций-лучше результат, по сути потребляет меньше энергии.
      - Ethash в этом плане не эффективен, не безопасен, не доказана математическая стойкость, плохо с описаниями и стандартизацией, по сути там чисто ситетическое усложнение которое замедляет и делает работу менее эффективной.