Security Evaluation of SHA - 3 Report prepared for the CRYPTREC Project
نویسنده
چکیده
Draft FIPS PUB 202 [32] speci es the Secure Hash Algorithm-3 (SHA-3) family of functions. The SHA-3 functions are based on instances of the Keccak algorithm that NIST selected as the winner of the SHA-3 cryptographic hash algorithm competition. The SHA-3 family consists of four cryptographic hash functions, SHA3-224, SHA3-256, SHA3-384, and SHA3-512, and two extendableoutput functions (XOFs), SHAKE128 and SHAKE256. This evaluation report summarizes the cryptanalysis published during the SHA-3 competition and afterwards on the Keccak algorithm.
منابع مشابه
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC
Governments and international standards bodies have established certification procedures for security-critical technologies, such as cryptographic algorithms. Such standards have not yet been established for cryptographic protocols and hence it is difficult for users of these protocols to know whether they are trustworthy. This is a serious problem as many protocols proposed in the past have fa...
متن کاملThe Camellia Cipher Algorithm and Its Use With IPsec
Camellia was selected as a recommended cryptographic primitive by the EU NESSIE (New European Schemes for Signatures, Integrity and Encryption) project [NESSIE] and was included in the list of cryptographic techniques for Japanese e-Government systems that was selected by the Japan CRYPTREC (Cryptography Research, Evaluation Committees) [CRYPTREC]. Camellia has been submitted to several other s...
متن کاملEvaluation Report for Cryptrec: Security Level of Cryptography – Ecdlp Mathematical Problem
This report discusses the elliptic curve discrete logarithm problem and the known methods to solve it. We consider the implications of these methods for choosing the domain parameters in elliptic curve based cryptographic schemes. We also study special classes of elliptic curves. In particular, we discuss the security of Koblitz curves.
متن کاملRFC 4132 Camellia Cipher Suites for TLS July 2005
Camellia was selected as a recommended cryptographic primitive by the EU NESSIE (New European Schemes for Signatures, Integrity and Encryption) project [NESSIE] and included in the list of cryptographic techniques for Japanese e-Government systems, which were selected by the Japan CRYPTREC (Cryptography Research and Evaluation Committees) [CRYPTREC]. Camellia is also included in specification o...
متن کاملHardware Performance Evaluation of SHA-3 Candidate Algorithms
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace SHA1 and SHA2 with the new SHA-3, to ensure long term robustness of hash functions. In this paper, we present a comprehensive hardware evaluation for the final round SHA-3 candidates...
متن کامل