Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Encryption

+ - SHA-3 Second Round Candidates Released

Submitted by
Jeremy A. Hansen
Jeremy A. Hansen writes "NIST just announced their selections for algorithms going to the second round of the SHA-3 competition:

NIST received 64 SHA-3 candidate hash function submissions and accepted 51 first round candidates as meeting our minimum acceptance criteria. We have now selected 14 second round candidates to continue in the competition. Information about the second round candidate algorithms will be available here.

We were pleased by the amount and quality of the cryptanalysis we received on the first round candidates, and more than a little amazed by the ingenuity of some of the attacks. We thank all the submitters, those who provided analysis, those who provided valuable implementation performance data (particularly e-Bash, and the papers dealing with the effects of the AES round instruction, FPGA implementations, and working store requirements of the algorithms). We were also pleased and grateful (although not surprised) for the graceful and forthright manner with which several of the submitters took bad news, and confirmed attacks, or recognized the shortcomings of their submission. In selecting this set of second round candidates we tried to include only algorithms that we thought had a chance of being selected as SHA-3. We were willing to extrapolate higher performance for conservative designs with apparently large safety factors, but comparatively unforgiving of aggressive designs that were broken, or nearly broken during the course of the review. We were more willing to accept disquieting properties of the hash function if the designer had apparently anticipated them, than if they were discovered during the review period, even if there were apparent fixes. We were generally alarmed by attacks on compression functions that seemed unanticipated by the submitters.

There are still some details of a few of the second round candidates that concern us. We will shortly post a statement describing each of the second round candidates, the factors that we liked about the submission and identifying any lingering concerns that we have. Submitters of the second round candidates are invited to tweak their submissions to improve them if they wish, fix any inconsistencies, problems or shortcomings in the specification or source code, and submit them to us by Sept. 15, 2009."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

SHA-3 Second Round Candidates Released

Comments Filter:

Never tell people how to do things. Tell them WHAT to do and they will surprise you with their ingenuity. -- Gen. George S. Patton, Jr.

Working...