Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SHA3/SHAKE spec mirror sha1/2 domain changes? #625

Closed
fliphil opened this issue Apr 9, 2019 · 3 comments
Closed

SHA3/SHAKE spec mirror sha1/2 domain changes? #625

fliphil opened this issue Apr 9, 2019 · 3 comments
Milestone

Comments

@fliphil
Copy link
Collaborator

fliphil commented Apr 9, 2019

Hello,

I was wondering if at some point the SHA3/SHAKE specification will use a domain value for the messageLength (replacing inEmpty and inBit) and eliminating outBit? This would bring it inline with how the SHA1/2 spec is currently designed, and I like this approach.

Thanks!
Phil

@celic
Copy link
Collaborator

celic commented Apr 9, 2019

I also like the approach. The problem lies within the SHAKE MCTs. They are not well designed for a domain value at the moment. They require the domain to consist of a single minimum and maximum pair as the MCT algorithm has no concept of selecting a valid length from a varied domain.

I am also in favor of redesigning the SHAKE MCTs so that they can properly accept a domain. After that is completed, changing SHA3/SHAKE over to mirror SHA1/2 would be trivial.

@celic celic added this to the Far horizons milestone Apr 15, 2019
@celic
Copy link
Collaborator

celic commented Nov 5, 2020

Stay tuned for SHA3 revision 2.0 which allows a registration similar to SHA2. Documentation in progress.

@celic
Copy link
Collaborator

celic commented Nov 16, 2020

Duplicate of #1003

@celic celic marked this as a duplicate of #1003 Nov 16, 2020
@celic celic closed this as completed Nov 16, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants