SHA-3, Keccak and SHAKE (Sponge Function)

preview_player
Показать описание

Article:
Рекомендации по теме
Комментарии
Автор

Great explanation.

It makes sense now why they call it "Sponge", "Absorb" and "Squeeze"!

pakoti
Автор

Thank you very much Bill, I was getting super confused on what would be the starting values of r and c, which you explained were zero. That cleared it up for me. I saw so many videos for sha3 but none have explained the starting values of r and c as clearly as you have. This video cleared all doubts I had on how sha3 works.

vivek
Автор

Very brief, to the point, easy to be understood explanation + saved my time. Many thanks professor

abo-alhosam
Автор

thank you for making this available to us plebs Bill

MuscleTeamOfficial
Автор

Great work, you helped me to understand keccak.

jakubkosuth
Автор

Thanks ​ @Bill Buchanan OBE ! you did amazing and useful analysis !

alexpetrov
Автор

So... its just a CSPRNG but you keep sprikling the data in its internal state periodically?

olhoTron
Автор

hello mr bill... i need ur answer
can we get hash of massage of etherume rawtx
as we do for bitcoin???

adnantatlis
Автор

I've been reading "FIPS PUB 202" specification because I am attempting to implement SHA3 in Ada 2012 and a question arises that I cannot find an answer to in the spec... At what point does the value of "b" need to be decided? My implementation is almost finished but for this small detail. It's been a fascinating exercise, working through a difficult programming task in a language I'm not familiar with.

CasualInventor
Автор

The only thing I didn't understand is what is the purpose of c?

pakoti
Автор

Why is only the "rate" portion of the state used as output?

pkenllure
Автор

Why are collisions important? It's not like you can get the same hash as original with a fake and meaningful document? It's almost certain it's gonna be a bunch of nonsense?

kornelijekovac
Автор

What is weakness of sha 2 ? My mind very weak

sunnsunn