NIST logo

Publication Citation: New Cryptographic Hash Algorithm Family: NIST Holds a Public Competition to Find New Algorithms

NIST Authors in Bold

Author(s): Shirley M. Radack;
Title: New Cryptographic Hash Algorithm Family: NIST Holds a Public Competition to Find New Algorithms
Published: May 28, 2008
Abstract: This bulletin summarizes the information that was disseminated by the National Institute of Standards and Technology (NIST) in a November 2007 Federal Register Notice. NIST is soliciting candidates for a new and robust cryptographic hash algorithm for use by Federal government agencies in protecting their information systems and information. The notice invited the public to submit candidate algorithms, and all nominations must be received by NIST by October 31, 2008. NIST is conducting an open, public process to identify suitable candidates for the new hash algorithm, which is needed because of recent advances in the cryptanalysis of hash functions. The new hash algorithm will be named SHA-3, and it will augment the hash algorithms currently specified in Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard. Hash algorithms take a variable length message and produce a small fixed size output called a hash value or message digest. Hash algorithms are used as building blocks in many cryptographic applications such as digital signatures, message authentication code, key derivation, and random number generators.
Citation: ITLB -
Keywords: Cryptography; digital signatures; Federal Information Processing Standards; hash algorithms; information security; message authentication; Secure Hash Standard.
Research Areas: Cybersecurity
PDF version: PDF Document Click here to retrieve PDF version of paper (39KB)