SHA-3 Design and Cryptanalysis Report


Autoria(s): Rechberger, Christian; Bjorstad, Tor; Daemen, Joan; De Canniere, Christophe; Gauravaram, Praveen
Data(s)

27/08/2010

Resumo

The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also reflected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results.

Identificador

http://eprints.qut.edu.au/81710/

Relação

http://www.ecrypt.eu.org/documents/D.SYM.4.pdf

Rechberger, Christian, Bjorstad, Tor, Daemen, Joan, De Canniere, Christophe, & Gauravaram, Praveen (2010) SHA-3 Design and Cryptanalysis Report. ECRYPT II European Network of Excellence in Cryptology II, ICT-2007-216676. Katholieke Universiteit Leuven.

Direitos

Copyright 2010 European Commission

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Tipo

Report