Keccak Definition
Keccak is a cryptographic hash function that was chosen by the National Institute of Standards and Technology (NIST) as the winner of the NIST hash function competition in 2012. Derived from the cryptographic function family Keccak, which was designed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche, it was named the new SHA-3 standard hash function.
Keccak Key Points
- Keccak is recognized as the industry cryptographic hash function standard known as SHA-3.
- It was devised by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche.
- It was chosen by the NIST in its hash function competition, held in 2012.
- Keccak offers high level of security and efficiency.
What is Keccak?
Keccak is a cryptographic algorithm, more specifically known as a hash function. Essentially, hash functions generate a fixed size output (a hash) from any type and amount of data input. It’s a crucial part of any cryptographic system because it provides an encryption service that is highly secure and remarkably efficient.
Who Developed Keccak?
Keccak was developed by leading cryptographers Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. Using their extensive experience and expertise in the field, these developers designed Keccak to be a reliable hash function that ensures data integrity and security.
When Was Keccak Developed?
The development of Keccak took place in the early 21st Century, culminating in its selection as the winner of the NIST’s hash function competition in 2012. This event confirmed Keccak’s credibility, and it was subsequently adopted as the SHA-3 hash function standard.
Where is Keccak used?
Keccak is utilized within computer and communication security systems worldwide. This includes key derivation functions, pseudorandom number generators, and in message authentication codes. In the blockchain context, it is often used in creating a unique identifier for data entries otherwise commonly known as “hashing”.
Why is Keccak significant?
Keccak’s significance lies in its level of security and efficiency. The hash function boasts a high resistance against attempts of collisions, preimages, and second preimages, all of which are highly desirable properties for security purposes. The Keccak function also offers cryptographic versatility serving multiple functionalities while maintaining a high level of performance.
How Does Keccak Work?
Keccak operates by using a sponge construction, absorbing input data bit by bit into its state and then “squeezing” out the hash bit by bit. It has powerful diffusion characteristics that have been mathematically proven to quickly achieve a high level of entropy (randomness). Any change in the input, even a minuscule one, will result in a radically different hash. This high sensitivity to input changes is an important feature that contributes to Keccak’s robust security offering.