The padding is needed for sponge function since Keccak uses the sponge construction. Depending on the width of permutation r
, here I'm guessing you use 1600 bits, the padding function appends 10*1 to the input text to form a padded string of length in multiple of r
. This is why you get 1600 bit from 64-bit text.
When you apply Keccak algorithm on a text message, you get a "message digest".
Keccak is the winner of SHA3, where SHA stands for Secure Hash Algorithm. You can tell by its name that Keccak is a cryptographic hash function which has three properties:
- Pre-image resistance
- Second pre-image resistance
- Collision resistance
These basically mean that Keccek is a one-way function and it is extremely hard to find two message having the same message digest, and vice versa. And the first point simply tells you that you can't recover the message from the message digest.