US holds monster hash competition

By

NIST seeks suggestions for cryptographic hash algorithms.

US holds monster hash competition
The National Institute of Standards and Technology (NIST) is holding a competition to develop one or more cryptographic 'hash' algorithms to augment and revise the current Secure Hash Standard (Federal Information Processing Standard [FIPS] 180-2).

As a first step in the process, the organisation is asking for comments on its recently published draft minimum acceptability requirements, submission requirements and evaluation criteria for candidate algorithms.

"Hashing algorithms are mathematical procedures that take data, usually a message, and chop and combine it down into a much shorter number that is a 'fingerprint' of the original data," NIST stated.

"Good hash algorithms have two features. Two different inputs are overwhelmingly likely to generate two different fingerprints and, given a specific fingerprint, there is no practical way of calculating a set of input data that will have the same fingerprint."

Hash algorithms are used widely by the Federal government and others in various applications, such as digital signatures and message authentication.

"FIPS 180-2 specifies five cryptographic hash algorithms (SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512)," NIST added.

"Because serious attacks have been reported in recent years against cryptographic hash algorithms, including SHA-1, NIST is preparing the groundwork for a more secure hash standard."
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:

Most Read Articles

Phishing attack nets enormous npm supply chain compromise

Phishing attack nets enormous npm supply chain compromise

VicRoads to phase out passwords in favour of passkeys

VicRoads to phase out passwords in favour of passkeys

Service NSW centralises security, networking in mammoth CloudOps overhaul

Service NSW centralises security, networking in mammoth CloudOps overhaul

Apple adds "mercenary spyware" protection to new A19 chip

Apple adds "mercenary spyware" protection to new A19 chip

Log In

  |  Forgot your password?