Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

What's our story for Keccak (aka SHA-3)? #817

Closed
public opened this issue Mar 17, 2014 · 10 comments
Closed

What's our story for Keccak (aka SHA-3)? #817

public opened this issue Mar 17, 2014 · 10 comments

Comments

@public
Copy link
Member

public commented Mar 17, 2014

I hear @tiran knows about these things? I think SHA-3 missed the 3.4 merge window for some reason?

OpenSSL seems unlikely to get SHA-3 until there's a TLS cipher suite that needs it. It might be nice to get SHA-3 support before whenever that is, perhaps via a dedicated backend?

@Ayrx
Copy link
Contributor

Ayrx commented Mar 17, 2014

+1 on this. Is there a reference C implementation yet? (Have not kept up with SHA-3 news.)

@tiran
Copy link
Contributor

tiran commented Mar 17, 2014

SHA-3 has been removed from Python 3.4 beta because SHA-3 was not finalized before RC phase. I still maintain the standalone package. I'm going to work on SHAKE support and will release a new version in a couple of weeks.

See ticket #8, too.

@public
Copy link
Member Author

public commented Mar 17, 2014

Do we want to ship Keccak prior SHA-3 getting finalised fully?

The key encryption on keybase.io uses it and RFCs have already been published that suggest supporting it. It seems likely that even if SHA-3 gets standardised there will be incompatible software out there using slightly different Keccak parameters that we might want to support anyway.

@public public changed the title What's our story for SHA-3? What's our story for Keccak (aka SHA-3)? Mar 17, 2014
@alex
Copy link
Member

alex commented Mar 18, 2014

I think the answer is "no" for now. I'm going to mark this as closed and we can reopen/file a new issue in the future.

@alex alex closed this as completed Mar 18, 2014
@mgrabovsky
Copy link

Can this (or #8) be reopened now?

@reaperhulk
Copy link
Member

Until our C backends (specifically OpenSSL) support sha3 we don't have a good way to ship this. I will go ahead and reopen though because it's a relevant question now that it's finalized.

@reaperhulk reaperhulk reopened this Aug 27, 2015
@cipherself
Copy link
Contributor

@mgrabovsky Meanwhile, apparently Keccak's official website has a reference C implementation and a Python implementation http://keccak.noekeon.org/files.html

@alex
Copy link
Member

alex commented Jun 2, 2016

We'll get this whenever it shows up in OpenSSL (or some other backend we support). Going to close this.

@mgrabovsky
Copy link

FYI: OpenSSL added support for SHA-3 in version 1.1.1.

@reaperhulk
Copy link
Member

Yep, tracking landing support in #4197

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Jul 31, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Development

No branches or pull requests

7 participants