Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Second Round Candidates (new NIST hash function)
National Institute of Standards and Technology ^ | July 24, 2009 | NIST

Posted on 07/25/2009 10:52:27 AM PDT by antiRepublicrat

Official comments on the Second Round Candidate Algorithms should be submitted using the "Submit Comment" link for the appropriate algorithm. Comments from hash-forum listserv subscribers will also be forwarded to the hash-forum listserv. We will periodically post and update the comments received to the appropriate algorithm.

(Excerpt) Read more at csrc.nist.gov ...


TOPICS: Government; Technical
KEYWORDS: cryptgraphy; hash; nist
This is for geeks only, but this will have a serious impact for all of us since hashes underlie much of modern computer security. It's about a competition for a new secure hash algorithm to replace the currently-used MD5 and SHA, which are showing to be less and less secure.

I'm happy to see that Bruce Schneier's Skein algorithm made the second cut. The security looks good, and the performance very good. I've been annoyed with the long waits of SHA when hashing large datasets and files.

1 posted on 07/25/2009 10:52:27 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | View Replies]

To: ShadowAce

-


2 posted on 07/25/2009 10:53:51 AM PDT by rabscuttle385 ("If this be treason, then make the most of it!" —Patrick Henry)
[ Post Reply | Private Reply | To 1 | View Replies]

To: antiRepublicrat

I have two patents with regards to hash functions. The first provides greater protection to the /etc/password, unix crypto function and the second is a hash collision avoidance means that can be used by any hash function.


3 posted on 07/25/2009 11:04:06 AM PDT by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

4 posted on 07/25/2009 11:13:31 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: antiRepublicrat
We are the Knights who say "NIST".

We are the keepers of the secret algorithm.

Photobucket

5 posted on 07/25/2009 11:17:22 AM PDT by rfp1234
[ Post Reply | Private Reply | To 1 | View Replies]

To: antiRepublicrat

Bruce also made the 2nd cut of the AES competition. It would be cool if he makes it on this.


6 posted on 07/25/2009 12:18:44 PM PDT by zeugma (Will it be nukes or aliens? Time will tell.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rfp1234

Too funny. However for a hash to be useful, it can’t be secret. Only fools rely on crypto that is so bad, the details have to be kept secret.


7 posted on 07/25/2009 12:21:18 PM PDT by zeugma (Will it be nukes or aliens? Time will tell.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: zeugma

Thanks for that info. I’d love it of Bruce won both, that is if his algorithms are the best. He doesn’t have a perfect record, remember MacGuffin, but he’s advanced a lot in the 15 years since.


8 posted on 07/25/2009 1:17:23 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 6 | View Replies]

To: zeugma

BTW, one of the advantages of Skein is that it is very easy to analyze, understand and implement. It only has three basic operations. IMHO, that makes it easier to find flaws and easier to program proper implementations. I think it would have been out of the competition at round one if it weren’t secure.


9 posted on 07/25/2009 1:22:40 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 7 | View Replies]

To: antiRepublicrat; taxcontrol
This is a very important issue, as SHA-1 was compromised years ago. The question is if the deadline 2Q 2012 gives sufficient time to check the new algorithm? But, the “best hash function” is a moving target depending on breakthroughs in mathematics and hardware. It is not easy.
10 posted on 07/25/2009 1:35:24 PM PDT by AdmSmith
[ Post Reply | Private Reply | To 1 | View Replies]

To: AdmSmith

I think three years is enough time for them to be vetted, and the finalists are going to get absolutely hammered for a while by most of the competent cryptographers in the world before the winner is picked.


11 posted on 07/25/2009 2:30:57 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 10 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson