The NIST hash function competition was an open competition held by the US
National Institute of Standards and Technology
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
(NIST) to develop a new
hash function
A hash function is any Function (mathematics), function that can be used to map data (computing), data of arbitrary size to fixed-size values, though there are some hash functions that support variable-length output. The values returned by a ...
called
SHA-3 to complement the older
SHA-1
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as 40 hexadecimal digits. It was designed by the United States ...
and
SHA-2. The competition was formally announced in the ''
Federal Register
The ''Federal Register'' (FR or sometimes Fed. Reg.) is the government gazette, official journal of the federal government of the United States that contains government agency rules, proposed rules, and public notices. It is published every wee ...
'' on November 2, 2007. "NIST is initiating an effort to develop one or more additional hash algorithms through a public competition, similar to the
development process for the
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
(AES)." The competition ended on October 2, 2012, when NIST announced that
Keccak would be the new SHA-3 hash algorithm.
The winning hash function has been published as NIST FIPS 202 the "SHA-3 Standard", to complement FIPS 180-4, the ''
Secure Hash Standard''.
The NIST competition has inspired other competitions such as the
Password Hashing Competition.
Process
Submissions were due October 31, 2008 and the list of candidates accepted for the first round was published on December 9, 2008.
NIST held a conference in late February 2009 where submitters presented their algorithms and NIST officials discussed criteria for narrowing down the field of candidates for Round 2. The list of 14 candidates accepted to Round 2 was published on July 24, 2009.
Another conference was held on August 23–24, 2010 (after
CRYPTO 2010) at the
University of California, Santa Barbara
The University of California, Santa Barbara (UC Santa Barbara or UCSB) is a Public university, public Land-grant university, land-grant research university in Santa Barbara County, California, United States. Tracing its roots back to 1891 as an ...
, where the second-round candidates were discussed.
The announcement of the final round candidates occurred on December 10, 2010. On October 2, 2012, NIST announced its winner, choosing
Keccak, created by Guido Bertoni, Joan Daemen, and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP.
Entrants
This is an incomplete list of known submissions.
NIST selected 51 entries for round 1.
14 of them advanced to round 2,
from which 5 finalists were selected.
Winner
The winner was announced to be
Keccak on October 2, 2012.
Finalists
NIST selected five SHA-3 candidate algorithms to advance to the third (and final) round:
*
BLAKE (Aumasson et al.)
*
Grøstl (
Knudsen et al.)
*
JH (Hongjun Wu)
*
Keccak (Keccak team,
Daemen et al.)
*
Skein (
Schneier et al.)
NIST noted some factors that figured into its selection as it announced the finalists:
*Performance: "A couple of algorithms were wounded or eliminated by very large
ardware gatearea requirement – it seemed that the area they required precluded their use in too much of the potential application space."
*Security: "We preferred to be conservative about security, and in some cases did not select algorithms with exceptional performance, largely because something about them made us 'nervous,' even though we knew of no clear attack against the full algorithm."
*Analysis: "NIST eliminated several algorithms because of the extent of their second-round tweaks or because of a relative lack of reported
cryptanalysis
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
– either tended to create the suspicion that the design might not yet be fully tested and mature."
*Diversity: The finalists included hashes based on different modes of operation, including the HAIFA and
sponge function constructions, and with different internal structures, including ones based on AES, bitslicing, and alternating XOR with addition.
NIST has released a report explaining its evaluation algorithm-by-algorithm.
Did not pass to final round
The following hash function submissions were accepted for round two, but did not make it to the final round. As noted in the announcement of the finalists, "none of these candidates was clearly broken".
*Blue Midnight Wish
*
CubeHash (
Bernstein)
*ECHO (
France Telecom)
*
Fugue
In classical music, a fugue (, from Latin ''fuga'', meaning "flight" or "escape""Fugue, ''n''." ''The Concise Oxford English Dictionary'', eleventh edition, revised, ed. Catherine Soanes and Angus Stevenson (Oxford and New York: Oxford Universit ...
(
IBM
International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
)
*Hamsi
*Luffa
*Shabal
*SHAvite-3
*
SIMD
Single instruction, multiple data (SIMD) is a type of parallel computer, parallel processing in Flynn's taxonomy. SIMD describes computers with multiple processing elements that perform the same operation on multiple data points simultaneousl ...
Did not pass to round two
The following hash function submissions were accepted for round one but did not pass to round two. They have neither been conceded by the submitters nor have had substantial cryptographic weaknesses. However, most of them have some weaknesses in the design components, or performance issues.
*ARIRANG (CIST – Korea University)
*CHI
*CRUNCH
*
FSB
*
Lane
*Lesamnta
*
MD6 (
Rivest et al.)
*
SANDstorm (
Sandia National Laboratories)
*Sarmal
*
SWIFFTX
*TIB3
Entrants with substantial weaknesses
The following non-conceded round one entrants have had substantial cryptographic weaknesses announced:
*AURORA (
Sony
is a Japanese multinational conglomerate (company), conglomerate headquartered at Sony City in Minato, Tokyo, Japan. The Sony Group encompasses various businesses, including Sony Corporation (electronics), Sony Semiconductor Solutions (i ...
and
Nagoya University)
*Blender
*Cheetah
*Dynamic SHA
*Dynamic SHA2
*
ECOH
*Edon-R
*
EnRUPT
*ESSENCE
*LUX
*MCSSHA-3
*
NaSHA
*Sgàil
*
Spectral Hash
*Twister
*Vortex
Conceded entrants
The following round one entrants have been officially retracted from the competition by their submitters; they are considered broken according to the NIST official round one candidates web site. As such, they are withdrawn from the competition.
*Abacus
*Boole
*DCH
*Khichidi-1
*MeshHash
*SHAMATA
*StreamHash
*Tangle
*WaMM
*Waterfall
Rejected entrants
Several submissions received by NIST were not accepted as first-round candidates, following an internal review by NIST.
In general, NIST gave no details as to why each was rejected. NIST also has not given a comprehensive list of rejected algorithms; there are known to be 13,
but only the following are public.
*HASH 2X
*Maraca
*MIXIT
*NKS 2D
*Ponic
*ZK-Crypt
See also
*
Advanced Encryption Standard process
The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the United States (NIST), was chosen using a process lasting from 1997 to 2000 that was markedly more ...
*
CAESAR Competition – Competition to design authenticated encryption schemes
*
Post-Quantum Cryptography Standardization
References
External links
NIST website for competitionSHA-3 ZooClassification of the SHA-3 CandidatesVHDL source code developed by the Cryptographic Engineering Research Group (CERG) at George Mason UniversityFIPS 202 – The SHA-3 Standard
{{Cryptography navbox, hash
Cryptographic hash functions
Cryptography contests
National Institute of Standards and Technology