Contents 3
Foreword 5
Introduction 5
1 Scope 6
2 References 6
3 Definitions 7
3.1 Definitions 7
3.2 Symbols 7
4 PRELIMINARY INFORMATIONPreliminary information 8
4.1 Introduction 8
4.2 Notation 8
4.2.1 Radix 8
4.2.2. Bit-numbering for Inputs inputs and Outputsoutputs 8
4.2.3. Assignment oOperations 9
4.2.4. List of SymbolsVoid 9
4.3. List of VariablesVoid 9
5 INPUTS AND OUTPUTSInputs and outputs 10
5.1. TUAK Tuak Inputs inputs and Outputsoutputs 10
5.2. Keccak and its Inputs inputs and Outputsoutputs 11
5.3. Other Inputs inputs and Substringssubstrings 12
6 DEFINITION OF THE EXAMPLE ALGORITHMSDefinition of the example algorithms 12
6.1 Derivation of TOPC 12
6.2. Specification of the Function function f1 13
6.3. Specification of the Function function f1* 15
6.4. Specification of the Functions functions f2, f3, f4 and f5 15
6.5. Specification of the Function function f5* 18
7 IMPLEMENTATION CONSIDERATIONSImplementation considerations 18
7.1. TOPC computed on or off the UICC? 18
7.2. Further customization 19
7.3. Resistance to side channel attacks 19
Annex A (normative):
TUAKTuak dDiagrams 20
Annex B (informative):
TUAKTuakApplication Programme Interface ( AP) in ANSI CI 22
Annex C (normative):
Specification of the Keccak permutation used within TUAKTuak 24
Annex D (informative):
Example sSource Ccode for TUAKTuak (ANSI C) 26
Annex E (informative):
Example sSource cCode for Keccak (ANSI C) 31
Annex F (informative):
Change history 37
Contents 3
Foreword 5
Introduction 5
1 Scope 6
2 References 6
3 Definitions 7
3.1 Definitions 7
3.2 Symbols 7
4 PRELIMINARY INFORMATIONPreliminary information 8
4.1 Introduction 8
4.2 Notation 8
4.2.1 Radix 8
4.2.2. Bit-numbering for Inputs inputs and Outputsoutputs 8
4.2.3. Assignment oOperations 9
4.2.4. List of SymbolsVoid 9
4.3. List of VariablesVoid 9
5 INPUTS AND OUTPUTSInputs and outputs 10
5.1. TUAK Tuak Inputs inputs and Outputsoutputs 10
5.2. Keccak and its Inputs inputs and Outputsoutputs 11
5.3. Other Inputs inputs and Substringssubstrings 12
6 DEFINITION OF THE EXAMPLE ALGORITHMSDefinition of the example algorithms 12
6.1 Derivation of TOPC 12
6.2. Specification of the Function function f1 13
6.3. Specification of the Function function f1* 15
6.4. Specification of the Functions functions f2, f3, f4 and f5 15
6.5. Specification of the Function function f5* 18
7 IMPLEMENTATION CONSIDERATIONSImplementation considerations 18
7.1. TOPC computed on or off the UICC? 18
7.2. Further customization 19
7.3. Resistance to side channel attacks 19
Annex A (normative):
TUAKTuak dDiagrams 20
Annex B (informative):
TUAKTuakApplication Programme Interface ( AP) in ANSI CI 22
Annex C (normative):
Specification of the Keccak permutation used within TUAKTuak 24
Annex D (informative):
Example sSource Ccode for TUAKTuak (ANSI C) 26
Annex E (informative):
Example sSource cCode for Keccak (ANSI C) 31
Annex F (informative):
Change history 37