首页> 美国政府科技报告 >Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition.
【24h】

Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition.

机译:sHa-3密码哈希算法竞赛第三轮报告。

获取原文

摘要

NIST opened a public competition on November 2, 2007, to develop a new cryptographic hash algorithm (referred to as SHA-3) to augment the hash algorithms specified in Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard. The competition was NISTs response to advances in the cryptanalysis of hash algorithms in recent years. An attack by Wang et al., and extended by many others, introduced serious concerns about the security of the SHA-1 government standard hash algorithm when used for the generation of digital signatures and in other security applications that require collision resistance. This report summarizes the third and final round of the SHA-3 (Secure Hash Algorithm-3) Cryptographic Hash Algorithm Competition. The third round began on January 31, 2011, when the National Institute of Standards and Technology (NIST) posted the finalists submissions for the third round, and ended on October 2, 2012, when NIST announced the SHA-3 winner Keccak. This report explains the evaluation and selection process.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号