Advertisement

The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market

  • Manuel J. Martínez
  • Roberto Uribeetxeberria
  • Urko Zurutuza
  • Miguel Fernández
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 85)

Abstract

SHA-3 [3] drives the design and analysis of efficient cryptographic hash functions. This paper foresees to summarise the selection process, its present status and forthcoming events highlighting the main novelties found. Some relevant criteria to compare the different candidates are described and finally special attention is paid to the impact of the future SHA-3 on the Spanish IT market.

Keywords

Cryptography Applied Cryptography Hash Functions and Novelty Detection 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    FIPS PUB 180-3 Secure Hash Standard (SHS), Information Technology Laboratory, National Institute of Standards and Technology (October 2008), http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf
  2. 2.
    Wang, X., Yin, Y.L., Yu, H.: Collision Search Attacks on SHA1, February 13 (2005), http://www.c4i.org/erehwon/shanote.pdf
  3. 3.
    Announcing Request for Candidate Algorithm Nominations for a New Cryptographic Hash Algorithm (SHA–3) Family, NIST, Federal Register, vol. 72(212) (November 2, 2007) Notices, http://csrc.nist.gov/groups/ST/hash/documents/FR_Notice_Nov07.pdf
  4. 4.
    Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM Conference on Computer and Communications Security 1993, pp. 62–73 (1993), http://cseweb.ucsd.edu/users/mihir/papers/ro.pdf
  5. 5.
  6. 6.
  7. 7.
    eBASH: ECRYPT Benchmarking of All Submitted Hashes, http://bench.cr.yp.to/ebash.html
  8. 8.
    Design Principles for Iterated Hash Functions, Stefan Lucks, e-print (September 29, 2004), http://eprint.iacr.org/2004/253.pdf
  9. 9.
    Rotational Cryptanalysis of ARX. D. Khovratovivh and Ivica Nikolic, University of LuxemborgGoogle Scholar
  10. 10.
    Rotational Cryptanalysis of (modified) versions of Bmw and Simd. Ivica Nikolic et othr, University of LuxembourgGoogle Scholar
  11. 11.
    Narrow-pipe SHA-3 candidates differ significantly from ideal random functions defined over big domains. Danilo Gligorovsky, Institute of Telematics-NUSTGoogle Scholar
  12. 12.
    Evaluation of Hardware Performance for the SHA-3 candidates using SASEBO-GII. K Kobyashi et othrs, University of Electrocommunications TokyoGoogle Scholar
  13. 13.
    Comparative Performance Review of the SHA-3 2nd Round candidates. Thomas Pornin, CryptologGoogle Scholar
  14. 14.
  15. 15.
    NISTIR 7620. Status report on the first round of the SHA-3 cryptographic hash algorithm competition, NIST (September 2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Manuel J. Martínez
    • 1
  • Roberto Uribeetxeberria
    • 2
  • Urko Zurutuza
    • 2
  • Miguel Fernández
    • 2
  1. 1.CSM Security GroupIbermáticaMadridSpain
  2. 2.Electronics and Computing DepartmentMondragon UniversityArrasate-MondragónSpain

Personalised recommendations