Article

Article title COMPETITION FINALISTS OF SHA-3 AND INFORMATION ON THEIR ANALYSIS
Authors L.K. Babenko, E.A. Ischukova
Section SECTION IV. METHODS AND TOOLS CRYPTOGRAPHY AND STEGANOGRAPHY
Month, Year 12, 2013 @en
Index UDC 681.03.245
DOI
Abstract In recent years, in the scientific world has been an increased interest in the design and analysis of hash algorithms. Along with the analysis of existing hash functions, are offered new, claimed by authors as being more reliable. Besides, the new methods of the analysis generally calculated on quite wide class of hashing algorithms are offered. Confirmation to that is competition on adoption of the new standard of hashing SHA-3 which has been recently finished by National institute of standards and technologies. The article discusses the basics of building hashing functions , which were the finalists SHA- 3. It covers the following hash functions: BLAKE, Skein, JH, Keccak, Grostl. The basic steps of transformation and its component parts are considereds for each function. Thus, in particular, a new block cipher algorithm Threefish is described in the Skein hash function. The article also provides the basic information of the known at the moment. Also its provides the main results of the analysis under consideration hashing functions.

Download PDF

Keywords Cryptography; analysis; hash function; reliability; strength; cipher.
References 1. Xiaoyun Wang, Hongbo Yu., Yiqun Lisa Yin, Efficient Collision Search Attacks on SHA-0 [Электронный ресурс]. – http://citeseerx.ist.psu.edu, свободный.
2. XiaoyunWang, Hongbo Yu., How to BreakMD5 and Other Hash Functions [Электронный ресурс]. – http://citeseerx.ist.psu.edu, свободный.
3. XiaoyunWang, Yiqun Lisa Yin, Hongbo Yu., Finding Collisions in the Full SHA-1 [Электронный ресурс]. – http://people.csail.mit.edu/yiqun/pub.htm, свободный.
4. Guido Bertoni, Joan Daemen, Michaлl Peeters, Gilles Van Assche. The Keccak reference, Version 3.0, January 14, 2011. – С. 1-69.
5. Shu-jen Chang, Ray Perlner, William E. Burr et all Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition [Электронный ресурс]. – http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7896.pdf, свободный.

Comments are closed.