NIST hash function competition
노트
위키데이터
- ID : Q15229223
말뭉치
- Find out more about the SHA-3 competition.[1]
- Moreover, NIST announced in November 2007 the start of the SHA-3 competition, with as goal to select a new hash function family by 2012.[2]
- The Bit-Exclusion Test, which is designed to meet one of the requirements of the SHA-3 competition -- that the message be provided in an array of bytes.[3]
- One of the five finalists of the SHA-3 competition was the BLAKE hash function; however, the NIST authors found a bug in the source code of every one of the BLAKE reference implementations.[3]
- The goal of the SHA-3 competition was to specify "a new hash algorithm to augment and revise" FIPS 180-2, the standard that specified SHA-1 and SHA-2.[4]
- The SHA-3 competition was organized by the United States National Institute of Standards and Technology (NIST).[4]
- This means that the NIST-modified Keccak and the winner of the SHA-3 competition are likely to be very different.[5]
- The proposal uses exactly the same cryptographic primitive as selected at the end of the SHA-3 competition.[5]
- NIST has announced in November 2007 that it would organize the SHA-3 competition, with as goal to select a new hash function family by 2012.[6]
- In October 2012, Keccak won the NIST hash function competition and is proposed as the SHA-3 standard.[7]
- On October 2, 2012, Keccak was selected as the winner of the NIST hash function competition.[8]
- Though The NIST hash function competition selected a new hash function, SHA-3 in 2012, it is not meant to replace SHA-2, as no significant attack on SHA-2 has been demonstrated.[8]
- The selection was challenging, because we had a strong field of fourteen hash algorithms remaining in the SHA-3 competition that were very strong contenders for the hash function standard.[9]
소스
- ↑ NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition
- ↑ The NIST SHA-3 Competition: A Perspective on the Final Year
- ↑ 3.0 3.1 How the SHA-3 competition declared a winning hash function
- ↑ 4.0 4.1 Crypto competitions: SHA-3: a Secure Hash Algorithm
- ↑ 5.0 5.1 What the heck is going on with NIST’s cryptographic standard, SHA-3?
- ↑ The State of Hash Functions and the NIST SHA-3 Competition
- ↑ SHA-3: Keccak, Grøstl, Blake, SHAKE and Skein - The Final Versions
- ↑ 8.0 8.1 New hash algorithms
- ↑ The Skein Hash Function Family
메타데이터
위키데이터
- ID : Q15229223