Analysis of the new standard hash function

09/23/2022
by   F. Martín-Fernández, et al.
0

On 2^nd October 2012 the NIST (National Institute of Standards and Technology) in the United States of America announced the new hashing algorithm which will be adopted as standard from now on. Among a total of 73 candidates, the winner was Keccak, designed by a group of cryptographers from Belgium and Italy. The public selection of a new standard of cryptographic hash function SHA (Secure Hash Algorithm) took five years. Its object is to generate a hash a fixed size from a pattern with arbitrary length. The first selection on behalf of NIST on a standard of this family took place in 1993 when SHA-1 was chosen, which later on was replaced by SHA-2. This paper is focused on the analysis both from the point of view of security and the implementation of the Keccak function, which is the base of the new SHA-3 standard. In particular, an implementation in the mobile platform Android is presented here, providing the first known external library in this mobile operating system so that any developer could use the new standard hashing. Finally, the new standard in applications in the Internet of Things is analysed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/14/2019

GPU Accelerated Keccak (SHA3) Algorithm

Hash functions like SHA-1 or MD5 are one of the most important cryptogra...
research
03/10/2023

Optimal-Hash Exact String Matching Algorithms

String matching is the problem of finding all the occurrences of a patte...
research
04/06/2017

Online Hashing

Although hash function learning algorithms have achieved great success i...
research
02/07/2023

Homomorphic Hashing Based on Elliptic Curve Cryptography

For avoiding the exposure of plaintexts in cloud environments, some homo...
research
06/28/2023

Pb-Hash: Partitioned b-bit Hashing

Many hashing algorithms including minwise hashing (MinHash), one permuta...
research
08/19/2020

The Power of Hashing with Mersenne Primes

The classic way of computing a k-universal hash function is to use a ran...
research
05/06/2021

Hashing Modulo Alpha-Equivalence

In many applications one wants to identify identical subtrees of a progr...

Please sign up or login with your details

Forgot password? Click here to reset