Keccak
Keccak
2024-09-1760KTutoriais avançados

Keccak, pronounced "ketchak," is a versatile cryptographic tool developed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. While Keccak serves various purposes, it is most prominently known for its role as a hash function, offering heightened security levels compared to older hash algorithms like SHA-1 and SHA-2.


Speaking of SHA (Secure Hash Algorithm), this is a series of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) in the United States. Both SHA-1 and SHA-2 were designed by the National Security Agency (NSA) and share similar structures. Although Keccak supports output sizes (hash lengths) identical to SHA-2, its operational mechanism diverges significantly. Intriguingly, Keccak falls under the SHA family umbrella, often referred to as SHA-3.


As early as 2004, theoretical attacks on SHA-1 began to emerge and were publicly disclosed in 2005. By 2011, NIST declared SHA-2 as the new standard hash function. However, the transition from SHA-1 to SHA-2 was gradual, with most developers and computer scientists not adopting SHA-2 until early 2017. Soon afterward, in February 2017, Google announced the successful execution of a SHA-1 collision attack, rendering SHA-1 insecure and prompting its discontinuation.


The development of Keccak (SHA-3) started around 2007 when NIST initiated an open competition and review process seeking a new cryptographic hash function to overcome the potential weaknesses of SHA-1 and SHA-2. Although no significant attacks against SHA-2 had been demonstrated at that time, considering the potential for hash functions to be broken over time and the years required to develop new standard functions, coupled with the early attacks on SHA-1, NIST foresaw the need for a novel cryptographic hashing algorithm. Ultimately, in 2012, NIST announced Keccak as the winner, standardizing it as the latest member of the SHA family—SHA-3.


Keccak was favored by NIST partly due to its innovative structure, proven more secure and efficient than other algorithms. Technically, the SHA-3 algorithm is based on a sponge function or sponge construction, which contrasts with the Merkle-Damgård construction used by SHA-1 and SHA-2.


Presently, SHA-2 remains secure and widely employed, such as in Bitcoin and other cryptocurrencies where SHA-256 plays a pivotal role in mining. Looking ahead, with Keccak yet to be successfully attacked, we may witness its increased adoption. Nonetheless, as the field of cryptography evolves and new vulnerabilities surface, the coming years will likely see the emergence of more cryptographic hash algorithms.

Bate-papo ao vivo
Equipe de Suporte ao Cliente

Agora mesmo

Caro usuário do LBank

Nosso sistema de atendimento ao cliente online está com problemas de conexão. Estamos trabalhando ativamente para resolver o problema, mas, no momento, não podemos fornecer um prazo exato para a recuperação. Pedimos sinceras desculpas por qualquer inconveniente que isso possa causar.

Se precisar de ajuda, entre em contato conosco por e-mail e responderemos o mais rápido possível.

Obrigado pela sua compreensão e paciência.

Equipe de Suporte ao Cliente do LBank