XOF + SHAKE and cSHAKE + Scrypt

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:35 PM on 2/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

7 Terms

1
New cards

SHAKE

a hash function that returns an output of an arbitrary length. SHAKE is fundamentally the same construction as SHA-3, except that it is faster and permutes as much as you want it to permute in the squeezing phase

2
New cards

Producing outputs of different sizes is quite useful

not only to create a digest, but also to create random numbers, to derive keys, and so on.

3
New cards

cSHAKE

is pretty much exactly like SHAKE, except that it also takes a customization string. This customization string can be empty, or it can be any string you want. . A customization string allows you to customize your XOF!

4
New cards

domain separation

different hash functions must be used in order to make a proof work

5
New cards

Scrypt is a

slow-by-design hash function. Its purpose is to take some input data, and create a fingerprint of that data, but to do it very slowly.

6
New cards

Scrypt Properties. Like all hashing functions, scrypt has the following properties

Deterministic (Same input produces the same output every time)

Fixed-size output

Irreversible (By using the output an attacker can’t find the input)

7
New cards

Additionally, Scrypt has the following properties:

Computationally expensive and slow (It takes a long time for a computer to run the hash)

Memory intensive (Potentially several gigabytes of RAM is used to run the hash)

Memory-hard function used in Litecoin, Dogecoin, …

Used for password hashing