D.SYM.4 SHA-3 Design and Cryptanalysis Report

Publication: Research - peer-reviewReport – Annual report year: 2011

Standard

D.SYM.4 SHA-3 Design and Cryptanalysis Report. / Gauravaram, Praveen; Thomsen, Søren Steffen.

2011. (ECRYPT II - European Network of Excellence for Cryptology II).

Publication: Research - peer-reviewReport – Annual report year: 2011

Harvard

Gauravaram, P & Thomsen, SS 2011, D.SYM.4 SHA-3 Design and Cryptanalysis Report. ECRYPT II - European Network of Excellence for Cryptology II

APA

Gauravaram, P., & Thomsen, S. S. (2011). D.SYM.4 SHA-3 Design and Cryptanalysis Report. (ECRYPT II - European Network of Excellence for Cryptology II).

CBE

Gauravaram P, Thomsen SS 2011. D.SYM.4 SHA-3 Design and Cryptanalysis Report. (ECRYPT II - European Network of Excellence for Cryptology II).

MLA

Gauravaram, Praveen and Søren Steffen Thomsen D.SYM.4 SHA-3 Design and Cryptanalysis Report 2011. (ECRYPT II - European Network of Excellence for Cryptology II).

Vancouver

Gauravaram P, Thomsen SS. D.SYM.4 SHA-3 Design and Cryptanalysis Report. 2011. (ECRYPT II - European Network of Excellence for Cryptology II).

Author

Gauravaram, Praveen; Thomsen, Søren Steffen / D.SYM.4 SHA-3 Design and Cryptanalysis Report.

2011. (ECRYPT II - European Network of Excellence for Cryptology II).

Publication: Research - peer-reviewReport – Annual report year: 2011

Bibtex

@book{2d83bf81a3494f4da15ac2cdbe06ad68,
title = "D.SYM.4 SHA-3 Design and Cryptanalysis Report",
author = "Praveen Gauravaram and Thomsen, {Søren Steffen}",
year = "2011",
series = "ECRYPT II - European Network of Excellence for Cryptology II",

}

RIS

TY - RPRT

T1 - D.SYM.4 SHA-3 Design and Cryptanalysis Report

A1 - Gauravaram,Praveen

A1 - Thomsen,Søren Steffen

AU - Gauravaram,Praveen

AU - Thomsen,Søren Steffen

PY - 2011

Y1 - 2011

N2 - The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also re ected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results. So far, none of the 14 candidates were shown to have weaknesses when used with the recommended security parameters, and a lot of the cryptanalytic eorts continue to be directed at building blocks instead of the hash function construction as a whole. While this allows to build up a toolbox of candidate-specic techniques for analysis, and gives results at an earlier stage, this alone does not allow to draw direct conclusions about the security of the hash function that uses those building blocks. Also comparisons at this level are extremely dicult, as hash function use their building blocks in many dierent ways. Among the 14 candidates, only about a third of them have rst cryptanalytic results on the hash function proposal as a whole, were except the well dened security parameter nothing is changed. If nothing else, this seems to suggest that a lot of cryptanalysis remains to be done to allow for comparisons, and also to get the level of assurance that will be expected from a future SHA-3.

AB - The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also re ected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results. So far, none of the 14 candidates were shown to have weaknesses when used with the recommended security parameters, and a lot of the cryptanalytic eorts continue to be directed at building blocks instead of the hash function construction as a whole. While this allows to build up a toolbox of candidate-specic techniques for analysis, and gives results at an earlier stage, this alone does not allow to draw direct conclusions about the security of the hash function that uses those building blocks. Also comparisons at this level are extremely dicult, as hash function use their building blocks in many dierent ways. Among the 14 candidates, only about a third of them have rst cryptanalytic results on the hash function proposal as a whole, were except the well dened security parameter nothing is changed. If nothing else, this seems to suggest that a lot of cryptanalysis remains to be done to allow for comparisons, and also to get the level of assurance that will be expected from a future SHA-3.

BT - D.SYM.4 SHA-3 Design and Cryptanalysis Report

T3 - ECRYPT II - European Network of Excellence for Cryptology II

T3 - en_GB

ER -