Specifications

FIPS PUB 202 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

August 2015 - The FIPS 202 standard defines:

  • the Keccak-p permutations,
  • the sponge construction,
  • the Keccak sponge function,
  • the SHAKE128 and SHAKE256 extendable-output functions,
  • the SHA3-224, SHA3-256, SHA3-384 and SHA3-512 hash functions.

NIST Special Publication 800-185 - SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash and ParallelHash

December 2016 - The SP 800-185 standard defines:

  • the cSHAKE extendable-output functions (cSHAKE128 and cSHAKE256),
  • the KMAC pseudo-random functions (KMAC128, KMACXOF128, KMAC256, KMACXOF256),
  • the TupleHash extendable-output and hash functions (TupleHash128, TupleHashXOF128, TupleHash256, TupleHashXOF256),
  • the ParallelHash extendable-output and hash functions (ParallelHash128, ParallelHashXOF128, ParallelHash256, ParallelHashXOF256),

3GPP TS 35.231 - Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*

October 2014 - The 3GPP TS 35.231 standard defines:

  • TUAK, an authentication and key generation algorithm for mobile telephony, based on Keccak.

KangarooTwelve

August 2016 - This document defines:

  • the KangarooTwelve extendable-output and hash function,
  • the MarsupilamiFourteen extendable-output and hash function.

CAESAR submission: Ketje v2

September 2016 - This document defines:

  • the MonkeyDuplex construction,
  • the MonkeyWrap authenticated encryption mode,
  • the Ketje authenticated encryption schemes (Kejte Jr, Kejte Sr, Kejte Minor and Kejte Major).

CAESAR submission: Keyak v2

September 2016 - This document defines:

  • the Motorist authenticated encryption mode,
  • the Keyak authenticated encryption schemes (River Keyak, Lake Keyak, Sea Keyak, Ocean Keyak and Lunar Keyak).

Kravatte - Farfalle: parallel permutation-based cryptography

July 2017 - This document defines:

  • the Farfalle construction,
  • the Kravatte pseudo-random function,
  • the Kravatte-SAE, Kravatte-SIV and Kravatte-WBC-AE authenticated encryption schemes and the Kravatte-WBC wide block cipher.