Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2009, Vol. 26 ›› Issue (5): 577-586.DOI: 10.7523/j.issn.2095-6134.2009.5.001

• Review Article •     Next Articles

Survey on the candidate algorithms of SHA-3 Hash function family

XUE Yu, WU Wen-Ling, WANG Zhang-Yi   

  1. State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190,China; State Key Laboratory of Information Security, Graduate University, Chinese Academy of Sciences, Beijing 100049, China
  • Received:2009-04-08 Revised:2009-05-13 Online:2009-09-15
  • Supported by:

    国家自然科学基金项目(60873259)和863项目(2007AA01Z470)资助 

Abstract:

In order to develop the new Secure Hash Standard(SHA-3), NIST has announced request for candidate algorithms. Now the 51 first-round candidates are under evaluation worldwide. These algorithms represent the newest design ideas of cryptographic hash function, and SHA-3 will be another milestone like AES. In order to make domestic researchers know these new algorithms and join the work of evaluation, we briefly introduce these secure algorithms and classify them according to the structure. Meanwhile we sum up the design of security and efficiency on these algorithms.

Key words: Hash function, collision, efficient implementation, structure, differential

CLC Number: