from the cryptography mailing list
The introduction https://strobe.sourceforge.io/papers/strobe-latest.pdf
is well worth reading.
It seems that it is possible to implement secure communication protocols
with a very limited number of operations (10 different core functions)
and 4 bits of flags all based on one STROBE primitive (KECCAK-f).
The interesting part is the fact that while the protocol for information
exchange moves on, a transcript of past stages is recorded that affects
future operations.
"Strobe maintains a running hash of the protocol transcript,
which is the sequence of all operations and their data as seen
by the application layer."
The inclusion of these transcripts in subsequent operations clearly helps
to ensure, that the protocol develops as expected. Though it also
imposes limitations to what the protocol can achieve. The paper claims
that TLS can be implemented based on minimal STROBE operations.
While the implementation is targeted on IoT systems with limited computation
powers, this idea is IMHO quite interesting and promising.
-ralf
Show quoted text