Difference between revisions of "The SHA-3 Zoo"
m (Omit "conceded broken") |
Mschlaeffer (talk | contribs) |
||
| Line 11: | Line 11: | ||
[http://ehash.iaik.tugraz.at/uploads/c/ce/20090922-2230_SHA-3_round2_tweaks.pdf New: Round 2 tweaks for all candidates] | [http://ehash.iaik.tugraz.at/uploads/c/ce/20090922-2230_SHA-3_round2_tweaks.pdf New: Round 2 tweaks for all candidates] | ||
| + | |||
| + | |||
| + | The 5 finalists of the SHA-3 competition are: | ||
{| border="1" cellpadding="4" cellspacing="0" align="center" class="wikitable" style="text-align:center" | {| border="1" cellpadding="4" cellspacing="0" align="center" class="wikitable" style="text-align:center" | ||
| Line 17: | Line 20: | ||
|- | |- | ||
| [[BLAKE]] || Jean-Philippe Aumasson || || | | [[BLAKE]] || Jean-Philippe Aumasson || || | ||
| + | |- | ||
| + | | [[Groestl|Grøstl]] || Lars R. Knudsen || || | ||
| + | |- | ||
| + | | [[JH]] || Hongjun Wu || style="background:greenyellow" | preimage || | ||
| + | |- | ||
| + | | [[Keccak]] || The Keccak Team || || | ||
| + | |- | ||
| + | | [[Skein]] || Bruce Schneier || || | ||
| + | |- | ||
| + | |} | ||
| + | |||
| + | |||
| + | |||
| + | |||
| + | |||
| + | |||
| + | |||
| + | |||
| + | |||
| + | The following SHA-3 candidates advanced to round 2 but did not get into the final: | ||
| + | |||
| + | {| border="1" cellpadding="4" cellspacing="0" align="center" class="wikitable" style="text-align:center" | ||
| + | |- style="background:#efefef;" | ||
| + | ! width="120"| Hash Name !! width="160" | Principal Submitter !! width="150"| Best Attack on Main NIST Requirements !! width="140"| Best Attack on other Hash Requirements | ||
|- | |- | ||
| [[Blue Midnight Wish]] || Svein Johan Knapskog || || | | [[Blue Midnight Wish]] || Svein Johan Knapskog || || | ||
| Line 26: | Line 53: | ||
| [[Fugue]] || Charanjit S. Jutla || || | | [[Fugue]] || Charanjit S. Jutla || || | ||
|- | |- | ||
| − | |||
| − | |||
| [[Hamsi]] || <nowiki>Özgül Küçük</nowiki> || || | | [[Hamsi]] || <nowiki>Özgül Küçük</nowiki> || || | ||
| − | |||
| − | |||
| − | |||
| − | |||
|- | |- | ||
| [[Luffa]] || Dai Watanabe || || | | [[Luffa]] || Dai Watanabe || || | ||
| Line 42: | Line 63: | ||
| [[SIMD]] || <nowiki>Gaëtan Leurent</nowiki> || || | | [[SIMD]] || <nowiki>Gaëtan Leurent</nowiki> || || | ||
|- | |- | ||
| − | |||
| − | |||
|} | |} | ||
| + | |||
| + | |||
The following submitted hash functions have not advanced to round 2: | The following submitted hash functions have not advanced to round 2: | ||
| − | |||
{| border="1" cellpadding="4" cellspacing="0" align="center" class="wikitable" style="text-align:center" | {| border="1" cellpadding="4" cellspacing="0" align="center" class="wikitable" style="text-align:center" | ||
Revision as of 09:10, 13 December 2010
The SHA-3 Zoo (work in progress) is a collection of cryptographic hash functions (in alphabetical order) submitted to the SHA-3 contest (see also here). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all SHA-3 submitters is also available. For a software performance related overview, see eBASH. At a separate page, we also collect hardware implementation results of the candidates. Another categorization of the SHA-3 submissions can be found here.
The idea of the SHA-3 Zoo is to give a good overview of cryptanalytic results. We try to avoid additional judgement whether a submission is broken. The answer to this question is left to NIST. However, we categorize the cryptanalytic results by their impact from very theoretic to practical attacks. A detailed description is given in Cryptanalysis Categories.
At this time, 56 out of 64 submissions to the SHA-3 competition are publicly known and available. 51 submissions have advanced to round 1 and 14 submissions have made it into round 2.
The following table should give a first impression on the remaining SHA-3 candidates. It shows only the best known attack, more detailed results are collected at the individual hash function pages. A description of the main table is given here.
Recent updates of the SHA-3 Zoo
New: Round 2 tweaks for all candidates
The 5 finalists of the SHA-3 competition are:
| Hash Name | Principal Submitter | Best Attack on Main NIST Requirements | Best Attack on other Hash Requirements |
|---|---|---|---|
| BLAKE | Jean-Philippe Aumasson | ||
| Grøstl | Lars R. Knudsen | ||
| JH | Hongjun Wu | preimage | |
| Keccak | The Keccak Team | ||
| Skein | Bruce Schneier |
The following SHA-3 candidates advanced to round 2 but did not get into the final:
| Hash Name | Principal Submitter | Best Attack on Main NIST Requirements | Best Attack on other Hash Requirements |
|---|---|---|---|
| Blue Midnight Wish | Svein Johan Knapskog | ||
| CubeHash | Daniel J. Bernstein | preimage | |
| ECHO | Henri Gilbert | ||
| Fugue | Charanjit S. Jutla | ||
| Hamsi | Özgül Küçük | ||
| Luffa | Dai Watanabe | ||
| Shabal | Jean-François Misarsky | ||
| SHAvite-3 | Orr Dunkelman | ||
| SIMD | Gaëtan Leurent |
The following submitted hash functions have not advanced to round 2:
| Hash Name | Principal Submitter | Status | Best Attack on Main NIST Requirements | Best Attack on other Hash Requirements |
|---|---|---|---|---|
| Abacus | Neil Sholer | in round 1 | 2nd-preimage | |
| ARIRANG | Jongin Lim | in round 1 | ||
| AURORA | Masahiro Fujita | in round 1 | 2nd preimage | |
| Blender | Colin Bradbury | in round 1 | collision, preimage | near-collision |
| Boole | Greg Rose | in round 1 | collision | |
| Cheetah | Dmitry Khovratovich | in round 1 | length-extension | |
| CHI | Phillip Hawkes | in round 1 | ||
| CRUNCH | Jacques Patarin | in round 1 | length-extension | |
| DCH | David A. Wilson | in round 1 | collision | |
| Dynamic SHA | Xu Zijie | in round 1 | collision | length-extension |
| Dynamic SHA2 | Xu Zijie | in round 1 | collision | length-extension |
| ECOH | Daniel R. L. Brown | in round 1 | 2nd preimage | |
| Edon-R | Danilo Gligoroski | in round 1 | preimage | |
| EnRUPT | Sean O'Neil | in round 1 | collision | |
| ESSENCE | Jason Worth Martin | in round 1 | collision | |
| FSB | Matthieu Finiasz | in round 1 | ||
| HASH 2X | Jason Lee | not in round 1 | 2nd-preimage | |
| Khichidi-1 | M. Vidyasagar | in round 1 | collision | |
| LANE | Sebastiaan Indesteege | in round 1 | ||
| Lesamnta | Hirotaka Yoshida | in round 1 | ||
| LUX | Ivica Nikolić | in round 1 | collision, 2nd preimage | DRBG,HMAC |
| Maraca | Robert J. Jenkins | not in round 1 | preimage | |
| MCSSHA-3 | Mikhail Maslennikov | in round 1 | 2nd preimage | |
| MD6 | Ronald L. Rivest | in round 1 | ||
| MeshHash | Björn Fay | in round 1 | 2nd preimage | |
| NaSHA | Smile Markovski | in round 1 | collision | |
| NKS2D | Geoffrey Park | not in round 1 | collision | |
| Ponic | Peter Schmidt-Nielsen | not in round 1 | 2nd-preimage | |
| SANDstorm | Rich Schroeppel | in round 1 | ||
| Sarmal | Kerem Varıcı | in round 1 | preimage | |
| Sgàil | Peter Maxwell | in round 1 | collision | |
| SHAMATA | Orhun Kara | in round 1 | collision | |
| Spectral Hash | Çetin Kaya Koç | in round 1 | collision | |
| StreamHash | Michal Trojnara | in round 1 | collision | |
| SWIFFTX | Daniele Micciancio | in round 1 | ||
| Tangle | Rafael Alvarez | in round 1 | collision | |
| TIB3 | Daniel Penazzi | in round 1 | collision | |
| Twister | Michael Gorski | in round 1 | preimage | |
| Vortex | Michael Kounavis | in round 1 | preimage | |
| WaMM | John Washburn | in round 1 | collision | |
| Waterfall | Bob Hattersley | in round 1 | collision | |
| ZK-Crypt | Carmi Gressel | not in round 1 |
Your analysis is not mentioned? Drop a line at sha3zoo@iaik.tugraz.at to let us know!