NIST requests public comment on proposed SHA-3 cryptographic standard

May 30, 2014

The National Institute of Standards and Technology (NIST) has requested public comments on its newly proposed "Secure Hash Algorithm-3" (SHA-3) Standard, which is designed to protect the integrity of electronic messages.

The draft Federal Information Processing Standard Publication 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, specifies six permutation-based "sponge" functions based on Keccak, the winning algorithm selected from NIST's SHA-3 Cryptographic Hash Algorithm Competition. The functions include four fixed-length cryptographic hash functions, and two closely related "extendable-output" functions (XOFs). The four fixed-length hash functions provide alternatives to the SHA-2 family of hash functions specified in FIPS 180, Secure Hash Standard, which FIPS 202 will supplement. The XOFs can be specialized to hash functions, subject to additional security considerations, or used in a variety of other applications.

Cryptographic hash algorithms are a cornerstone of modern information security. They transform a digital message into a short "message digest" for use in digital signatures. Even a small change in the original message text creates a change in the digest, making it easier to detect accidental or intentional changes to the original message. Hash algorithms are used by many security applications, including random bit generation.

Explore further: NIST removes cryptography algorithm from random number generator recommendations

More information: Comments from the public on the draft of FIPS 202 are welcome for the next 90 days until August 26, 2014, after which NIST will incorporate them into the final version of the specification. The draft is available at csrc.nist.gov/publications/dra… 2/fips_202_draft.pdf. Comments may be sent to NIST either electronically or by mail. Full details appear in the Federal Register at federalregister.gov/a/2014-12336.

add to favorites email to friend print save as pdf

Related Stories

NIST proposes update to digital signature standard

Apr 18, 2012

The National Institute of Standards and Technology (NIST) has announced proposed changes to a standard that specifies how to implement digital signatures, which can be used to ensure the integrity of electronic documents, ...

Improving the security of Internet exchanges

Mar 20, 2009

(PhysOrg.com) -- TLS is the main protocol used today to secure exchanges over the Internet. The protocol has been subject to attacks in recent years, resulting in identity theft and data tampering. To address these problems, ...

New algorithm shakes up cryptography

May 16, 2014

Researchers at the Laboratoire Lorrain de Recherches en Informatique et ses Applications (CNRS/Université de Lorraine/Inria) and the Laboratoire d'Informatique de Paris 6 (CNRS/UPMC) have solved one aspect of the discrete ...

Recommended for you

Yahoo profit surges on Alibaba divestment, mobile

51 minutes ago

Yahoo said Tuesday its quarterly profit surged with its sale of shares in Chinese Internet powerhouse Alibaba, and also saw improving results from its mobile Internet initiatives.

Apple sees iCloud attacks; China hack reported

3 hours ago

Apple said Tuesday its iCloud server has been the target of "intermittent" attacks, hours after a security blog said Chinese authorities had been trying to hack into the system.

HP supercomputer at NREL garners top honor

5 hours ago

A supercomputer created by Hewlett-Packard (HP) and the Energy Department's National Renewable Energy Laboratory (NREL) that uses warm water to cool its servers, and then re-uses that water to heat its building, has been ...

User comments : 0