Featured Research

from universities, journals, and other organizations

NIST Issues Call For A New 'Hash' Algorithm

Date:
November 26, 2007
Source:
National Institute of Standards and Technology
Summary:
NIST has opened a competition to develop a new cryptographic hash algorithm, a tool that converts a file, message or block of data to a short "fingerprint" for use in digital signatures, message authentication and other computer security applications.

The National Institute of Standards and Technology (NIST) has opened a competition to develop a new cryptographic "hash" algorithm, a tool that converts a file, message or block of data to a short "fingerprint" for use in digital signatures, message authentication and other computer security applications.

Related Articles


The competition is NIST's response to recent advances in the analysis of hash algorithms. The new hash algorithm will be called Secure Hash Algorithm-3 (SHA-3) and will augment the hash algorithms currently specified in the Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard. NIST's goal is that SHA-3 provide increased security and offer greater efficiency for the applications using cryptographic hash algorithms. FIPS standards are required for use in federal civilian computer systems and are often adopted voluntarily by private industry.

FIPS 180-2 specifies five cryptographic hash algorithms, including SHA-1 and the SHA-2 family of hash algorithms. Because serious attacks have been reported in recent years against cryptographic hash algorithms, including SHA-1, and because SHA-1 and the SHA-2 family share a similar design, NIST has decided to standardize an additional hash algorithm to augment the ones currently specified in FIPS 180-2.

NIST issued a Call for a New Cryptographic Hash Algorithm (SHA-3) Family in a Federal Register Notice on Nov. 2, 2007. The announcement specifies the submission requirements, the minimum acceptability requirements, and the evaluation criteria for candidate hash algorithms. Entries for the competition must be received by Oct. 31, 2008.

Details about the competition are available at http://www.nist.gov/hash-competition.


Story Source:

The above story is based on materials provided by National Institute of Standards and Technology. Note: Materials may be edited for content and length.


Cite This Page:

National Institute of Standards and Technology. "NIST Issues Call For A New 'Hash' Algorithm." ScienceDaily. ScienceDaily, 26 November 2007. <www.sciencedaily.com/releases/2007/11/071108162007.htm>.
National Institute of Standards and Technology. (2007, November 26). NIST Issues Call For A New 'Hash' Algorithm. ScienceDaily. Retrieved November 26, 2014 from www.sciencedaily.com/releases/2007/11/071108162007.htm
National Institute of Standards and Technology. "NIST Issues Call For A New 'Hash' Algorithm." ScienceDaily. www.sciencedaily.com/releases/2007/11/071108162007.htm (accessed November 26, 2014).

Share This


More From ScienceDaily



More Computers & Math News

Wednesday, November 26, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

FCC Forces T-Mobile To Alert Customers Of Data Throttling

FCC Forces T-Mobile To Alert Customers Of Data Throttling

Newsy (Nov. 25, 2014) T-Mobile and the FCC have reached an agreement requiring the company to alert customers when it throttles their data speeds. Video provided by Newsy
Powered by NewsLook.com
Symantec Uncovers Sophisticated Spying Malware Regin

Symantec Uncovers Sophisticated Spying Malware Regin

Newsy (Nov. 24, 2014) A Symantec white paper reveals details about Regin, a spying malware of unusual complexity which is believed to be state-sponsored. Video provided by Newsy
Powered by NewsLook.com
How to Keep Your Android Device Safe This Holiday Season

How to Keep Your Android Device Safe This Holiday Season

Howdini (Nov. 24, 2014) Protect yourself against malware and hackers, especially during the hectic online shopping season. Mobile device security makes a great holiday gift and protects your loved ones from cyber attacks and identity theft. Video provided by Howdini
Powered by NewsLook.com
How to Keep You and Your Family's Identitiy Safe Online This Holiday Season

How to Keep You and Your Family's Identitiy Safe Online This Holiday Season

Howdini (Nov. 24, 2014) The hectic holiday season is a prime time for online identity theft, so make sure you’re protected.Be cautious when shopping online Internet security software makes a great holiday gift and protects your loved ones from cyber attacks and identity theft. Video provided by Howdini
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins