Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

Published

Author(s)

Meltem Sonmez Turan, Ray A. Perlner, Lawrence E. Bassham, William E. Burr, Dong H. Chang, Shu-jen H. Chang, Morris J. Dworkin, John M. Kelsey, Souradyuti Paul, Rene C. Peralta

Abstract

The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms currently specified in the Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard. The competition was NIST's response to advances in the cryptanalysis of hash algorithms. NIST received sixty-four submissions in October 2008, and selected fifty-one candidate algorithms as the first-round candidates on December 10, 2008, and fourteen as the second-round candidates on July 24, 2009. One year was allocated for the public review of the second-round candidates. On December 9, 2010, NIST announced five SHA-3 finalists to advance to the third (and final) round of the competition. This report summarized the evaluation and selection of the five finalists - BLAKE, Grøstl, JH, Keccak and Skein.
Citation
NIST Interagency/Internal Report (NISTIR) - 7764
Report Number
7764

Keywords

cryptographic hash algorithm, cryptographic hash function, cryptographic hash competition, cryptography, SHA-3 competition

Citation

Sonmez, M. , Perlner, R. , Bassham, L. , Burr, W. , Chang, D. , Chang, S. , Dworkin, M. , Kelsey, J. , Paul, S. and Peralta, R. (2011), Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition, NIST Interagency/Internal Report (NISTIR), National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.IR.7764 (Accessed October 1, 2025)

Issues

If you have any questions about this publication or are having problems accessing it, please contact [email protected].

Created February 23, 2011, Updated January 27, 2020
Was this page helpful?