Issue No.03 - May/June (2008 vol.6)
William E. Burr , US National Institute of Standards and Technology
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2008.55
Since the discovery of collision attacks against several well-known cryptographic hash functions in 2004, a rush of new cryptanalytic results cast doubt on the current hash function standards. The relatively new NIST SHA-2 standards aren't yet immediately threatened, but their long-term viability is now in question. The US National Institute of Standards and Technology (NIST) has therefore begun an international competition to select a new SHA-3 standard. This article outlines the competition, its rules, the requirements for the hash function candidates, and the process that NIST will use to select the final winning SHA-3 standard.
cryptographic standards, hash function, SHA-1, SHA-2, SHA-3, Merkle-Damg?rd, Crypto Corner
William E. Burr, "A New Hash Competition", IEEE Security & Privacy, vol.6, no. 3, pp. 60-62, May/June 2008, doi:10.1109/MSP.2008.55