Gilles Van Assche

40 posts

Gilles Van Assche

Gilles Van Assche

@docgcrypto

Enthusiastic member of @KeccakTeam — cryptographer at ST — professor at Université Libre de Bruxelles ad interim

Brussels, Belgium Katılım Mayıs 2019
255 Takip Edilen198 Takipçiler
Yannik Schrade
Yannik Schrade@yrschrade·
Today we've released v0.4.0 of @Arcium: - Full support for <encrypted> Ed25519 keygen and sig verification - SHA-3 hashing in <encrypted> instructions - Arcium Profiler - Anchor v0.32.1 compatibility - Auto-sync keys - Many performance optimizations mpc/acc☂️
Arcium ☂️@Arcium

We’re excited to announce the Arcium v0.4.0 release. This update brings new features, performance optimizations, and developer experience improvements. We encourage all developers to migrate to v0.4.0 and leverage these updates for more efficient development on Arcium. Details below.

English
45
4
183
10.2K
Gilles Van Assche
Gilles Van Assche@docgcrypto·
@jedisct1 You are free to define anything you want, but personally I prefer and recommend to stick to 12 rounds.
English
0
0
0
30
Frank
Frank@jedisct1·
Would you despise me for all eternity if I dared to go with 10 rounds of Keccak-p, @docgcrypto?
English
1
0
1
587
Gilles Van Assche
Gilles Van Assche@docgcrypto·
@cronokirby It is not usual that you can halve the number of rounds of a standard primitive and still get comfortable safety margin. 😀
English
1
0
2
106
mjos\dwez @m-jos.bsky.social
mjos\dwez @m-jos.bsky.social@mjos_crypto·
Basically, XKCP is too complicated for its own good. FIPS 202 SHA3/SHAKE specs are not the easiest to translate to correct code, but the "official" Keccak implementation is just incredibly big/cumbersome. (This was CVE-2022-37454 -- fixed in fall '22.) eprint.iacr.org/2023/331
mjos\dwez @m-jos.bsky.social tweet media
English
1
3
14
1.4K
Gilles Van Assche retweetledi
Lionel Rivière
Lionel Rivière@mangeurdpommes·
@KeccakTeam 🤣 That’s a way to say non ADD, ROT, XOR!
Lionel Rivière tweet media
English
0
1
3
0
Gilles Van Assche retweetledi
The Keccak Team
The Keccak Team@KeccakTeam·
Xoodoo is too cool to fall for linear and differential cryptanalysis! New trail bounds for Xoodoo, a bug fix, and confirmations by an independent team of researchers. keccak.team/2021/updated_b…
English
1
2
7
0
🦣 @dalias@hachyderm.io 🦣
🦣 @[email protected] 🦣@RichFelker·
I am irrationally overly angry that SHA3 followed the "let's gratuitously work with 64-bit words and lock out efficient tiny-embedded implementations" bandwagon when the underlying construct would have supported 32-bit with no loss.
English
2
0
4
0
rvk
rvk@_rvklein_·
@oconnor663 Thank you very much! I actually had not heard of that at all until you had mentioned it here. [Or I missed it which happens.] I was hoping there would be more work on/with this sort of sponge function construction coming up and it seems as though that is also happening as well.
English
1
0
0
0
Jack O'Connor
Jack O'Connor@oconnor663·
Announcing BLAKE3! My last 1.5 years of work :) * Faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2 * Merkle tree: unlimited parallelism, verified streaming * Builtin MAC, KDF, XOF * One algorithm, no variants * Rust crate: crates.io/crates/blake3 Try it: cargo install b3sum
Jack O'Connor tweet media
English
8
156
474
0
Frank
Frank@jedisct1·
@docgcrypto @tylrtrmbl If an API supports non-empty key IDs, would you recommend falling back to a dedicated ABSORB for the nonce? Or use something like len(key_id)||key_id||nonce for the initialization?
English
1
0
0
0
Frank
Frank@jedisct1·
The AMA with Joan Daemen is about to start! #fse2020
English
1
0
0
0
Gilles Van Assche
Gilles Van Assche@docgcrypto·
@xorhash @oconnor663 "Double invocation": actually the cost only amounts to an extra block to absorb the key. Also, HopMAC has interesting properties w.r.t. side-channel attacks.
English
0
0
1
0
xorhash
xorhash@xorhash·
@oconnor663 As far as I know, BLAKE3 has a trivial native MAC mode though and HopMAC for K12 specified in draft-irtf-cfrg-kangarootwelve-04 needs double invocation of K12. I'm not aware of there being an officially condoned, performant alternative to HopMAC.
English
2
0
0
0
David Wong
David Wong@cryptodavidw·
The world of hash functions is annoying af: SHA-3 is standardized, but Argon2 uses BLAKE2, but there is BLAKE3, but Ed25519 uses SHA-2, but...
English
4
0
17
0
Frank
Frank@jedisct1·
@docgcrypto @tylrtrmbl While you’re here :) Could you clarify how you are planning to integrate the nonce with the key ID in Xoodyak? Has that tweak been documented somewhere?
English
1
0
0
0
Gilles Van Assche
Gilles Van Assche@docgcrypto·
@oconnor663 @cryptodavidw @zooko Is efficiency the only relevant metric in symmetric crypto? :-) Anyway, efficiency goes beyond plain software speed and includes things less directly measurable, e.g., energy on dedicated circuits, protections against side-channel attacks.
English
0
0
2
0
Jack O'Connor
Jack O'Connor@oconnor663·
@cryptodavidw @zooko The best comparison I know of is our graphs in the BLAKE3 paper. K12 and B3 have very similar peak throughput on x86. Currently the official implementation of B3 leads by a bit. B3's advantage is larger for short inputs, and on 32-bit systems.
English
3
1
2
0
Gilles Van Assche
Gilles Van Assche@docgcrypto·
@bascule @cryptodavidw "Garbage" is a strong word, but clearly I agree with you that the SHAKEs are the better instances of FIPS202. Hopefully now the idea of disentangling output sizes and security strength levels makes its way. Hence new projects should consider using XOFs instead of fixed hashes.
English
0
0
2
0
Gilles Van Assche
Gilles Van Assche@docgcrypto·
@jedisct1 @tylrtrmbl What are the properties you have in mind? Sure they share the same 12×32 bits structure, but as far as diffusion is concerned, Xoodoo and Gimli take different approaches.
English
2
0
0
0
Frank
Frank@jedisct1·
@tylrtrmbl I also use Xoodoo for other projects. Both are great, they have similar properties, and can be used the same way. Both are in round 2 of the LWC competition. I like the well-defined Cyclist mode that Xoodoo can be used with, though.
English
2
0
0
0