Difference between revisions of "The SHA-3 Zoo"
(added SIMD) |
Crechberger (talk | contribs) m (added Link to other categorization) |
||
| Line 1: | Line 1: | ||
| − | The SHA-3 Zoo is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (work in progress). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all [[SHA-3 submitters]] is also available. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates. | + | The SHA-3 Zoo is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (work in progress). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all [[SHA-3 submitters]] is also available. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates. Another categorization of the SHA-3 submissions can be found [http://www.uni-weimar.de/cms/fileadmin/medien/medsicherheit/Research/SHA3/Classification_of_the_SHA-3_Candidates.pdf here]. |
<br><br> | <br><br> | ||
At this time, 35 out of 64 submissions to the SHA-3 competition are publicly known and available, and hence take advantage of early external cryptanalysis (so far, 9 submissions have been broken). | At this time, 35 out of 64 submissions to the SHA-3 competition are publicly known and available, and hence take advantage of early external cryptanalysis (so far, 9 submissions have been broken). | ||
Revision as of 09:53, 3 December 2008
The SHA-3 Zoo is a collection of cryptographic hash functions (in alphabetical order) submitted to the SHA-3 contest (work in progress). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all SHA-3 submitters is also available. For a software performance related overview, see eBASH. At a separate page, we also collect hardware implementation results of the candidates. Another categorization of the SHA-3 submissions can be found here.
At this time, 35 out of 64 submissions to the SHA-3 competition are publicly known and available, and hence take advantage of early external cryptanalysis (so far, 9 submissions have been broken).
Recent updates of the SHA-3 Zoo
| Hash Function Name | Status | External Cryptanalysis |
|---|---|---|
| BLAKE | submitted | none |
| Blue Midnight Wish | submitted | yes |
| Boole | submitted | broken |
| CHI | submitted | none |
| CRUNCH | submitted | none |
| CubeHash | submitted | yes |
| DCH | submitted | broken |
| Edon-R | submitted | yes |
| EnRUPT | submitted | broken |
| ESSENCE | submitted | none |
| FSB | submitted | none |
| Fugue | submitted | none |
| Grøstl | submitted | yes |
| HASH 2X | submitted | broken |
| JH | submitted | none |
| Keccak | submitted | none |
| LANE | submitted | none |
| Maraca | submitted | none |
| MCSSHA-3 | submitted | broken |
| MD6 | submitted | yes |
| MeshHash | submitted | yes |
| NaSHA | submitted | none |
| NKS2D | submitted | broken |
| Ponic | submitted | broken |
| Sarmal | submitted | yes |
| Sgàil | submitted | broken |
| SHAMATA | submitted | yes |
| SIMD | submitted | none |
| Skein | submitted | none |
| Spectral Hash | submitted | yes |
| SWIFFTX | submitted | none |
| TIB3 | submitted | none |
| Vortex | submitted | yes |
| WaMM | submitted | broken |
| Waterfall | submitted | none |
Your submission is not on this list? Drop a line at sha3zoo@iaik.tugraz.at to let us know!