Photo by Markus Spiske on Unsplash

SHAKE Stirs-up Crypto

--

When I teach cryptography, I normally define the hashing methods (MD5, SHA-1, SHA-256, and so on), the symmetric key methods (AES, 3DES, ChaCha20, and so on), and asymmetric key methods (ECC, RSA, ElGamal, and so on). And so I include SHA-3 as a hashing method, in the same old way I talk about MD5, SHA-1 and SHA-256. We feed in some data, and out pops a fixed-length hash signature.

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.