NIST Competition for New Cryptographic Hash Function

National Institute of Standards and Technology (NIST) is having a competition for a new cryptographic hash function. NIST did a good job managing the AES process (competition for Advanced Encryption Standard). They are obviously going to do in similar way with hash functions. You’ll find Announcement for the Development of New Hash Algorithm(s) for the Revision of Federal Information Processing Standard (FIPS) 180–2, Secure Hash Standard here. Last year and the year before, NIST sponsored two workshops (2005 and 2006) to discuss the requirements for a new hash function, and last month it announced a competition to choose a replacement for SHA-1.

Submissions will be due in fall 2008, and a single standard is scheduled to be chosen by the end of 2011. This is a reasonable schedule. Designing a secure hash function seems harder than designing a secure encryption algorithm, although we don’t know whether this is inherently true of the mathematics or simply a result of our imperfect knowledge. Producing a new secure hash standard is going to take a while. Luckily, we have an interim solution in SHA-256.

This is big chance to create something really big and important in security area. Bruce Schneier told that his Twofish team is going to reconstitute and get to work on an Advanced Hash Standard submission.

Read Announcement, and more here and here.

Share

4 thoughts on “NIST Competition for New Cryptographic Hash Function

  1. Pingback: NIST - A New Hash Competition Update | Dragan on Security

  2. Pingback: Dragan on Security

  3. Pingback: Comments on the Hash Algorithm Requirements and Evaluation Criteria | Dragan on Security

  4. Pingback: MSDN Webcast: Cryptography API: Next Generation Overview | Dragan on Security

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>