Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Andrew R. Regenscheid; Ray A. Perlner; Shu-jen H. Chang; John M. Kelsey; Mridul Nandi; Souradyuti Paul;|
|Title:||Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition|
|Published:||September 23, 2009|
|Abstract:||The National Institute of Standards and Technology is in the process of selecting a new cryptographic hash algorithm through a public competition. The new hash algorithm will be referred to as SHA-3 and will complement the SHA-2 hash algorithms currently specified in FIPS 180-3, Secure Hash Standard. In October, 2008, 64 candidate algorithms were submitted to NIST for consideration. Among these, 51 met the minimum acceptance criteria and were accepted as First Round Candidates on Dec. 10, 2008, marking the beginning of Round 1 of the competition. This report describes the evaluation criteria and selection process based on public feedback and internal review of the first round candidates, and summarizes the 14 candidate algorithms selected as a result on July 24, 2009 for moving forward to Round 2 of the competition. The 14 second round candidates are BLAKE, BLUE MIDNIGHT WISH, CubeHash, ECHO, Fugue, Gr stl, Hamsi, JH, Keccak, Luffa Shabal, SHAvite-3, SIMD, and Skein.|
|Citation:||NIST Interagency/Internal Report (NISTIR) - 7620|
|Keywords:||SHA-3, cryptographic hash algorithm, cryptography|
|Research Areas:||Computer Security|
|PDF version:||Click here to retrieve PDF version of paper (324KB)|