Talk:NIST hash function competition

{{WikiProject banner shell|class=C|1=

{{WikiProject Cryptography |importance=High}}

{{WikiProject Computing |importance=Mid |software=yes |software-importance=Mid |security=yes |security-importance=High}}

}}

New listings

I've just added a lot of new items to the list of entrants based on [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/submissions_rnd1.html], the official "Round 1" list. As of now, we have 55 of the 64 submissions listed, so most of that is done, but some of the rejects are still not listed because NIST didn't list them.Unfortunately, the references for all of these are ZIP files, becuase that's the format that NIST uses to make those submissions available. If anyone can find appropriate documents in a better format, please feel free to replace or supplement my references with those. Gavia immer (talk) 19:42, 10 December 2008 (UTC)

---

Is Maraca (submitted but not accepted) actually broken? The SHA-3 Zoo has no indication of any analysis of Maraca. The SHA-3 Zoo also has links to the pdf's for each individual submission as well as to the full zips. rossum —Preceding unsigned comment added by 86.144.100.224 (talk) 16:00, 11 December 2008 (UTC)

:There's no announcement I can find about Maraca being broken. It was just not listed as accepted, without further public comment. I've tweaked the text in the "rejected" section to reflect that not all of them are known to be broken. I'm also going to work on getting the (better) SHA-3 Zoo links for the newly announced algorithms up, but it may take a minute. Gavia immer (talk) 16:24, 11 December 2008 (UTC)

Marking proposals "broken" while NIST and/or authors have not decided them to be so is not under the rules of the SHA-3 project. Even the crypto community has not formed a final decision whether functions such as EnRUPT, NaSHA or Cheetah are actually broken. Many of them are to be presented on the [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/Feb2009/program.html | First SHA-3 conference]. Only after NIST will announce what is considered broken. So far NIST even declared that trivial fixes may be allowed, which may also change the status of the candidates.

The SHA-3 Zoo editors have also moved to a more objective representation of the candidate statuses: [http://ehash.iaik.tugraz.at/wiki/The_SHA-3_Zoo].158.64.77.208 (talk) 21:58, 17 January 2009 (UTC)

Unbroken hashes

It would be helpful to compile a list of the unbroken hash functions, maybe in descending order of amount of cryptanalysis that has been done. I think there are a few hash functions that are unbroken only because no one has bothered to attack them. I'll add this if no one has any objections.

18.103.14.83 (talk) 17:21, 10 April 2009 (UTC)

A good place to start would be http://ehash.iaik.tugraz.at/wiki/The_SHA-3_ZooQuelrod (talk) 21:56, 31 July 2010 (UTC)

Move to "SHA-3 competition" or "SHA-3 process"?

In their [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/sha3_NISTIR7620.pdf first round report], NIST calls this the SHA-3 competition, which is how I think of it and is shorter than the current title. (There is a redirect, at least.)

Another option: "SHA-3 process" would make the naming consistent with Advanced Encryption Standard process. (No redirect for "SHA-3 process".) —Preceding unsigned comment added by 24.7.68.35 (talk) 18:46, 18 April 2010 (UTC)

Stale status

This page is written as though many events on the timeline are in the future, despite the fact that the relevant dates have come and gone. Most significantly, both the one-year comment period and the third Candidate Conference have passed (with the latter taking place in March of 2012). Unfortunately, I haven't come across any further updates anywhere else. Anyone here have references describing current status and plans for a final decision? — Preceding unsigned comment added by 69.191.241.47 (talk) 20:55, 29 June 2012 (UTC)

Summary

NIST has published a summary of the competition and the candidates [https://csrc.nist.gov/groups/ST/hash/sha-3/Round3/documents/Round3_Report_NISTIR_7896.pdf here]. I do not have time to read it and edit the article. Tomer A. 12:09, 13 November 2012 (UTC)

Adding other SHA-3 candidates to wikipedia

I hope that there should be articles for these hashes for the sake of completeness, as they are all used in cryptocurrency algorithms like X11, X13, X14, X15 and more.

  • Blue Midnight Wish
  • CubeHash (Bernstein)
  • ECHO (France Telecom)
  • Fugue
  • Hamsi
  • Luffa
  • Shabal
  • SHAvite-3
  • SIMD