Hi,
I think that is an interesting suggestion. My understanding is that Keccak-p[1600, 12] is twice as fast as Keccak-f[1600]. For the XOF maybe even Keccak-p[1600, 12] is overkill:
"The choice of SHAKE-128 as instantiation of the XOF is actually important for performance; also we do not need any of the traditional security properties of hash functions from SHAKE-128, but rather that the output “looks uniformly random."”
XOF, H, G, PRF, KDF could potentially use different amount of rounds. Could also consider using parallel hashing if any of the field are big enouhg to justify that.
I think ARM and RISC-V should be applauded for adding Keccak accelaration. My understanding is that the Keccak acceleration in these instuction set are quite general and would be equally good at accelerating Keccak-p[1600, 12 rounds].
I think the most relevant benchmark for PQC should be such a modern platform with ability to accelerate any Keccak variant. The PQC algorithms will likely be with us for many decades. I don't think it is a good idea to optimize for what is on the market today.
Cheers,
John
[1]
https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-4efe772b67ea5506&q=1&e=7f83e25c-f3a7-49b1-9a3c-bd312753eea0&u=https%3A%2F%2Fkeccak.team%2Fthird_party.html (note: some recent papers still
have to be added)
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion on the web visit
https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-33f16420b4877d0c&q=1&e=7f83e25c-f3a7-49b1-9a3c-bd312753eea0&u=https%3A%2F%2Fgroups.google.com%2Fa%2Flist.nist.gov%2Fd%2Fmsgid%2Fpqc-forum%2Feae84996-8682-5345-ee41-ad0c2b52e10e%2540noekeon.org.