Featured Research

from universities, journals, and other organizations

'Hash' Competition Could Help Strengthen Computer Security

Date:
February 6, 2007
Source:
National Institute of Standards and Technology
Summary:
NIST is planning a competition to develop one or more cryptographic 'hash' algorithms to augment and revise the current Secure Hash Standard (Federal Information Processing Standard 180-2).

The National Institute of Standards and Technology (NIST) is planning a competition to develop one or more cryptographic "hash" algorithms to augment and revise the current Secure Hash Standard (Federal Information Processing Standard 180-2). As a first step in this process, NIST is looking for comments on its recently published draft minimum acceptability requirements, submission requirements and evaluation criteria for candidate algorithms.

Related Articles


Hashing algorithms are mathematical procedures that take data, usually a message, and chop and combine it down into a much shorter number that is a "fingerprint" of the original data. Good hash algorithms have two features--two different inputs are overwhelmingly likely to generate two different fingerprints, and given a specific fingerprint, there is no practical way of calculating a set of input data that will have the same fingerprint.

Hash algorithms are used widely by the federal government and others in various applications, such as digital signatures and message authentication. FIPS 180-2 specifies five cryptographic hash algorithms--SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. Because serious attacks have been reported in recent years against cryptographic hash algorithms, including SHA-1, NIST is preparing the groundwork for a more secure hash standard.

For more information on the proposed competition, including a copy of the Federal Register announcement issued Jan. 23, 2007, and to submit comments on the draft hash algorithm requirements and evaluation criteria, see http://www.nist.gov/hash-function. Since the submission requirements and the evaluation criteria may change as a result of the comments that NIST receives, candidate algorithms should not be submitted until the competition is announced later this year.


Story Source:

The above story is based on materials provided by National Institute of Standards and Technology. Note: Materials may be edited for content and length.


Cite This Page:

National Institute of Standards and Technology. "'Hash' Competition Could Help Strengthen Computer Security." ScienceDaily. ScienceDaily, 6 February 2007. <www.sciencedaily.com/releases/2007/02/070201182931.htm>.
National Institute of Standards and Technology. (2007, February 6). 'Hash' Competition Could Help Strengthen Computer Security. ScienceDaily. Retrieved November 24, 2014 from www.sciencedaily.com/releases/2007/02/070201182931.htm
National Institute of Standards and Technology. "'Hash' Competition Could Help Strengthen Computer Security." ScienceDaily. www.sciencedaily.com/releases/2007/02/070201182931.htm (accessed November 24, 2014).

Share This


More From ScienceDaily



More Computers & Math News

Monday, November 24, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Symantec Uncovers Sophisticated Spying Malware Regin

Symantec Uncovers Sophisticated Spying Malware Regin

Newsy (Nov. 24, 2014) A Symantec white paper reveals details about Regin, a spying malware of unusual complexity which is believed to be state-sponsored. Video provided by Newsy
Powered by NewsLook.com
Hackers Target Business Travellers

Hackers Target Business Travellers

Reuters - Business Video Online (Nov. 24, 2014) A newly detected malware, dubbed Darkhotel, infects hotel networks with spying software to steal sensitive data from the computers of high profile business executives, warns a leading computer security firm. Ciara Lee reports. Video provided by Reuters
Powered by NewsLook.com
Microsoft Adds Robot Guards, Ushers In Sci-Fi Apocalypse

Microsoft Adds Robot Guards, Ushers In Sci-Fi Apocalypse

Newsy (Nov. 23, 2014) Microsoft has robotic security guards working at its Silicon Valley Campus. Video provided by Newsy
Powered by NewsLook.com
European Parliament Might Call For Google's Break-Up

European Parliament Might Call For Google's Break-Up

Newsy (Nov. 22, 2014) This is the latest development in an antitrust investigation accusing Google of unfairly prioritizing own products and services in search results. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins