The Community for Technology Leaders
Green Image
Issue No. 03 - May/June (2008 vol. 6)
ISSN: 1540-7993
pp: 60-62
William E. Burr , US National Institute of Standards and Technology
ABSTRACT
Since the discovery of collision attacks against several well-known cryptographic hash functions in 2004, a rush of new cryptanalytic results cast doubt on the current hash function standards. The relatively new NIST SHA-2 standards aren't yet immediately threatened, but their long-term viability is now in question. The US National Institute of Standards and Technology (NIST) has therefore begun an international competition to select a new SHA-3 standard. This article outlines the competition, its rules, the requirements for the hash function candidates, and the process that NIST will use to select the final winning SHA-3 standard.
INDEX TERMS
cryptographic standards, hash function, SHA-1, SHA-2, SHA-3, Merkle-Damg?rd, Crypto Corner
CITATION
William E. Burr, "A New Hash Competition", IEEE Security & Privacy, vol. 6, no. , pp. 60-62, May/June 2008, doi:10.1109/MSP.2008.55
83 ms
(Ver 3.3 (11022016))