Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publication Citation: Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

NIST Authors in Bold

Author(s): Meltem Sonmez Turan; Ray A. Perlner; Lawrence E. Bassham; William E. Burr; Dong H. Chang; Shu-jen H. Chang; Morris J. Dworkin; John M. Kelsey; Souradyuti Paul; Rene C. Peralta;
Title: Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition
Published: February 23, 2011
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms currently specified in the Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard. The competition was NIST's response to advances in the cryptanalysis of hash algorithms. NIST received sixty-four submissions in October 2008, and selected fifty-one candidate algorithms as the first-round candidates on December 10, 2008, and fourteen as the second-round candidates on July 24, 2009. One year was allocated for the public review of the second-round candidates. On December 9, 2010, NIST announced five SHA-3 finalists to advance to the third (and final) round of the competition. This report summarized the evaluation and selection of the five finalists - BLAKE, Grøstl, JH, Keccak and Skein.
Citation: NIST Interagency/Internal Report (NISTIR) - 7764
Pages: 38 pp.
Keywords: cryptographic hash algorithm, cryptographic hash function, cryptographic hash competition, cryptography, SHA-3 competition
Research Areas: Computer Security, Federal Information Processing Standards, Standards
PDF version: PDF Document Click here to retrieve PDF version of paper (347KB)