MessiandNeymar

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, October 2, 2012

SHA-3 is Keccak

Posted on 4:05 PM by Unknown

NIST have today announced the selection of the new SHA-3 Secure Hash Algorithm: NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition.

The winning algorithm, Keccak (pronounced “catch-ack”), was created by Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics and MichaĆ«l Peeters of NXP Semiconductors. The team’s entry beat out 63 other submissions that NIST received after its open call for candidate algorithms in 2007, when it was thought that SHA-2, the standard secure hash algorithm, might be threatened. Keccak will now become NIST’s SHA-3 hash algorithm.

A wealth of information is available at the Keccak home page.

Keccak is a sponge construction function. Sponge functions get their name from their alternating phases of absorbing and squeezing:

The sponge construction then proceeds in two phases: the absorbing phase followed by the squeezing phase.
  • In the absorbing phase, the r-bit input message blocks are XORed into the first r bits of the state, interleaved with applications of the function f . When all message blocks are processed, the sponge construction switches to the squeezing phase.
  • In the squeezing phase, the first r bits of the state are returned as output blocks, inter- leaved with applications of the function f . The number of output blocks is chosen at will by the user.

Keccak comes with a thorough Implementation Overview document, as well as a pseudo-code Specifications Summary.

The selection of Keccak is the culmination of nearly 5 years of extensive, world-wide competition and coordination; the NIST web site has all the details.

Bruce Schneier, whose Skein function was one of the finalists, pronounced himself quite pleased by the results, even though he also contends that the SHA-2 variants are still quite solid.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

Blog Archive

  • ►  2013 (165)
    • ►  September (14)
    • ►  August (19)
    • ►  July (16)
    • ►  June (17)
    • ►  May (17)
    • ►  April (18)
    • ►  March (24)
    • ►  February (19)
    • ►  January (21)
  • ▼  2012 (335)
    • ►  December (23)
    • ►  November (30)
    • ▼  October (33)
      • HMS Bounty RIP
      • Programmers and Paparazzi
      • 24 hours with the "17"
      • The slow maturation of C++
      • Kinda quiet recently...
      • A random collection of random stuff
      • IPv6 Summit in Slovenia
      • Instance tasting
      • New Linux 0, Old Laptop 1
      • Quantal Quetzal
      • Photo-essay on cork production
      • Facing the tsunami
      • The age of books is not yet over
      • Paul Allen is in the Bay Area
      • Scott Hanselman nails it
      • Once there was a sailboat...
      • Wind: 1, Oracle: 0
      • Presidential Precedent
      • Drilling down, spreading the load
      • XCOM Enemy Unknown
      • MOOCing again
      • Gawker outs VA
      • Harborside Health
      • It's not just a game ...
      • Leo Messi piece on ESPN
      • Social coding and Atlassian Stash
      • Gone Girl: a very short review
      • Computers and Chess
      • A translation guide for the culturally impaired
      • Russell Coutts goes airborne!
      • Perforce Git Fusion
      • SHA-3 is Keccak
      • San Francisco Measure F
    • ►  September (34)
    • ►  August (29)
    • ►  July (39)
    • ►  June (27)
    • ►  May (48)
    • ►  April (32)
    • ►  March (30)
    • ►  February (10)
Powered by Blogger.

About Me

Unknown
View my complete profile