SHA-3 Finalist Candidates announced

GEC: Discuss gaming, computers and electronics and venture into the bizarre world of STGODs.

Moderator: Thanas

Post Reply
User avatar
Pu-239
Sith Marauder
Posts: 4727
Joined: 2002-10-21 08:44am
Location: Fake Virginia

SHA-3 Finalist Candidates announced

Post by Pu-239 »

http://www.v3.co.uk/v3/news/2273888/nis ... n-hash-sha
The final five entrants in the SHA-3 encryption hash run by the National Institute of Standards and Technology (NIST)

The NIST competition is part of a long-term project to develop the next-generation of encryption technology. In the announcement BLAKE, Grøstl, JH, Keccak and Skein all made it through.


The NIST project started the search for SHA-3 in 2007 and has been whittling down the last for the past two years, excluding 53 entrants from some of the biggest names in the business, including IBM, France Telecom and Sandia National Laboratories.

The long test period is important considering the essential nature of secure SHA-3 methodology.

“What they are trying to do is produce a hash function that the community internationally will think is good and will be a stand for the next 20 years,” Jon Callas, PGP Fellow and member of the team behind Skein told V3.co.uk.

“Getting an extra couple of years for people to study things is to the benefit of everyone right now.”

The competition has however thrown up worrying questions about the level of security research in the US. The finalists are dominated by European and Asian consortia but nationality is not an issue Callas said.

“Our team is an international one that includes a couple of Europeans.”

“We’re motivated by the best security solution.”

SHA-2 is still secure Callas said. Early reports of attacks had been shown to no practical application.

Security guru Bruce Schneier is also one of the team members working on the Skein hash. He has expressed confidence in the security of the final list.



Read more: http://www.v3.co.uk/v3/news/2273888/nis ... z17oCM8xhN
The V3 App store has games, downloads and more. Visit the store now.
The email from NIST:

NIST has selected five SHA-3 candidate algorithms to advance to the third (and final) round:
· BLAKE
· Grøstl
· JH
· Keccak
· Skein
The selection was challenging, because we had a strong field of fourteen hash algorithms remaining in the SHA-3 competition that were very strong contenders for the hash function standard. Security was our greatest concern, and we took this very seriously, but none of these candidates was clearly broken. However, it is meaningless to discuss the security of a hash function without relating security to performance, so in reality, NIST wanted highly secure algorithms that also performed well. We preferred to be conservative about security, and in some cases did not select algorithms with exceptional performance, largely because something about them made us “nervous,” even though we knew of no clear attack against the full algorithm.
Performance is multidimensional: no algorithm excelled in every dimension. Every second-round candidate achieved at least tolerable performance on mainstream desktop or server systems, although the performance range was significant. There were bigger differences on constrained platforms and in hardware, where area is as much a performance factor as speed. A couple of algorithms were wounded or eliminated by very large area requirements – it seemed that the area they required precluded their use in too much of the potential application space. Some algorithms allowed very high levels of fine-grain parallelism that could be realized well with hardware, some exploited parallelism with vector units, and some seemed to fully exploit the considerable parallelism that can be achieved by conventional superscalar arithmetic logic units (ALUs) that can simultaneously launch several instructions per clock cycle. Several algorithms also exploited the power of 64-bit-wide ALUs.
No algorithm survived to become a finalist that did not have a clear round structure that could be readily adjusted to trade security for performance. NIST eliminated several algorithms because of the extent of their second-round tweaks or because of a relative lack of reported cryptanalysis – either tended to create the suspicion that the design might not yet be fully tested and mature. NIST was generally comfortable with tweaks to the number of rounds or to constants, but more suspicious of changes that seemed to affect the structure of the compression functions.
Some teams announced the tweaks that they would make if they were selected for the final round. NIST evaluated the second-round submissions, but not the proposed tweaks. However, we did consider whether the best attacks on some of the candidates seemed amenable to mitigation by a simple modification.
NIST also considered diversity in the selection of the finalists. The selected five finalists incorporated a number of new design ideas that have arisen in the last few years, such as the HAIFA and sponge hash constructions. The finalists include designs whose nonlinearity is based on the AES S-box, on a smaller (4- or 5-bit wide) S-box efficiently implemented as a sequence of basic logical instructions, and on the interaction between addition and XOR operations.
NIST thanks the submitters of all fourteen second-round candidates. Every second-round candidate was a very professional effort, and every candidate had strong features to recommend it. We also thank the many individuals and organizations who helped with the cryptanalysis of the candidates, or who provided performance data from their own implementations of the candidate algorithms. This selection would not have been possible without their help.
NIST will publish a report on the selection of the SHA-3 finalists in the near future that explains the rationale for the selections on an algorithm-by-algorithm basis.
If tweaks are being considered for the final round, the submissions are due on January 16, 2011. Specific submission requirements will be provided to the designers of the five SHA-3 finalists.
Bill Burr
William E. Burr
Manager, Cryptographic Technology Group
NIST
Some comments as a grad student doing my small part in evaluating these on FPGA hardware-

I'm surprised Skein was selected- it really sucks on low-end embedded hardware and is pretty much only fast on large 64-bit CPUs, due to the large 64-bit add.

I've spent far too much time implementing JH on FPGA hardware and don't welcome optimizing it further for my assignments :P . It's quite small but performance is mediocre. Software doesn't seem too hot, but no idea about small platforms

A bit disappointed BMW didn't make it in- it sucked on hardware in terms of area, but did have quite a bit of room for optimization and would have been "fun", and was very fast on software. The comment on the lack of a regular round structure was probably aimed at it though.

ah.....the path to happiness is revision of dreams and not fulfillment... -SWPIGWANG
Sufficient Googling is indistinguishable from knowledge -somebody
Anything worth the cost of a missile, which can be located on the battlefield, will be shot at with missiles. If the US military is involved, then things, which are not worth the cost if a missile will also be shot at with missiles. -Sea Skimmer


George Bush makes freedom sound like a giant robot that breaks down a lot. -Darth Raptor
User avatar
Pu-239
Sith Marauder
Posts: 4727
Joined: 2002-10-21 08:44am
Location: Fake Virginia

Re: SHA-3 Finalist Candidates announced

Post by Pu-239 »

Hm, on second thought, this topic probably should be moved to SLAM given G&P seems more for tech support and gaming. Can a mod please do so? Thanks!

ah.....the path to happiness is revision of dreams and not fulfillment... -SWPIGWANG
Sufficient Googling is indistinguishable from knowledge -somebody
Anything worth the cost of a missile, which can be located on the battlefield, will be shot at with missiles. If the US military is involved, then things, which are not worth the cost if a missile will also be shot at with missiles. -Sea Skimmer


George Bush makes freedom sound like a giant robot that breaks down a lot. -Darth Raptor
Post Reply