Difference between revisions of "The SHA-3 Zoo"
 (Abacus withdrawn)  | 
				Mschlaeffer (talk | contribs)  m  | 
				||
| Line 1: | Line 1: | ||
| − | The SHA-3 Zoo (work in progress) is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (see also [http://en.wikipedia.org/wiki/SHA-3 here]). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all [[SHA-3 submitters]] is also available. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates. Another categorization of the SHA-3 submissions can be found [http://  | + | The SHA-3 Zoo (work in progress) is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (see also [http://en.wikipedia.org/wiki/SHA-3 here]). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all [[SHA-3 submitters]] is also available. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates. Another categorization of the SHA-3 submissions can be found [http://eprint.iacr.org/2008/511.pdf here].  | 
<br><br>  | <br><br>  | ||
The idea of the SHA-3 Zoo is to give a good overview of cryptanalytic results. We try to avoid additional judgement whether a submission is broken. The answer to this question is left to NIST. However, we categorize the cryptanalytic results by their impact from very theoretic to practical attacks. A detailed description is given in [[Cryptanalysis Categories]].  | The idea of the SHA-3 Zoo is to give a good overview of cryptanalytic results. We try to avoid additional judgement whether a submission is broken. The answer to this question is left to NIST. However, we categorize the cryptanalytic results by their impact from very theoretic to practical attacks. A detailed description is given in [[Cryptanalysis Categories]].  | ||
Revision as of 18:58, 2 February 2009
The SHA-3 Zoo (work in progress) is a collection of cryptographic hash functions (in alphabetical order) submitted to the SHA-3 contest (see also here). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all SHA-3 submitters is also available. For a software performance related overview, see eBASH. At a separate page, we also collect  hardware implementation results of the candidates. Another categorization of the SHA-3 submissions can be found here.
The idea of the SHA-3 Zoo is to give a good overview of cryptanalytic results. We try to avoid additional judgement whether a submission is broken. The answer to this question is left to NIST. However, we categorize the cryptanalytic results by their impact from very theoretic to practical attacks. A detailed description is given in Cryptanalysis Categories.
At this time, 55 out of 64 submissions to the SHA-3 competition are publicly known and available. 51 submissions have advanced to the first round. So far, 9 out of 51 first round candidates have been officially conceded broken or withdrawn by the designers.
The following table should give a first impression on the remaining SHA-3 candidates. It shows only the best known attack, more detailed results are collected at the individual hash function pages. A description of the main table is given here.
Recent updates of the SHA-3 Zoo
| Hash Name | Principal Submitter | Best Attack on Main NIST Requirements | Best Attack on other Hash Requirements | 
|---|---|---|---|
| ARIRANG | Jongin Lim | ||
| AURORA | Masahiro Fujita | ||
| BLAKE | Jean-Philippe Aumasson | ||
| Blender | Colin Bradbury | preimage | |
| Blue Midnight Wish | Svein Johan Knapskog | ||
| Cheetah | Dmitry Khovratovich | length-extension | |
| CHI | Phillip Hawkes | ||
| CRUNCH | Jacques Patarin | length-extension | |
| CubeHash | Daniel J. Bernstein | preimage | |
| Dynamic SHA | Xu Zijie | length-extension | |
| Dynamic SHA2 | Xu Zijie | length-extension | |
| ECHO | Henri Gilbert | ||
| ECOH | Daniel R. L. Brown | ||
| Edon-R | Danilo Gligoroski | preimage | |
| EnRUPT | Sean O’Neil | collision | |
| ESSENCE | Jason Worth Martin | ||
| FSB | Matthieu Finiasz | ||
| Fugue | Charanjit S. Jutla | ||
| Grøstl | Lars R. Knudsen | ||
| Hamsi | Ozgul Kucuk | ||
| JH | Hongjun Wu | preimage | |
| Keccak | The Keccak Team | ||
| LANE | Sebastiaan Indesteege | ||
| Lesamnta | Hirotaka Yoshida | ||
| Luffa | Dai Watanabe | ||
| LUX | Ivica Nikolic | ||
| MCSSHA-3 | Mikhail Maslennikov | collision | |
| MD6 | Ronald L. Rivest | ||
| NaSHA | Smile Markovski | collision | |
| SANDstorm | Rich Schroeppel | ||
| Sarmal | Kerem Varici | preimage | |
| Sgàil | Peter Maxwell | collision | |
| Shabal | Jean-Francois Misarsky | ||
| SHAMATA | Orhun Kara | ||
| SHAvite-3 | Orr Dunkelman | ||
| SIMD | Gaetan Leurent | ||
| Skein | Bruce Schneier | ||
| Spectral Hash | Cetin Kaya Koc | ||
| SWIFFTX | Daniele Micciancio | ||
| TIB3 | Daniel Penazzi | collision | |
| Twister | Michael Gorski | 2nd preimage | |
| Vortex | Michael Kounavis | preimage | 
The following hash functions have been submitted to the NIST competition but did not advance to the first round or have been conceded broken by the designers:
| Hash Name | Principal Submitter | Status | Best Attack on Main NIST Requirements | 
|---|---|---|---|
| Abacus | Neil Sholer | conceded broken | 2nd-preimage | 
| Boole | Greg Rose | conceded broken | collision | 
| DCH | David A. Wilson | conceded broken | collision | 
| HASH 2X | Jason Lee | not in round 1 | 2nd-preimage | 
| Khichidi-1 | M. Vidyasagar | conceded broken | collision | 
| Maraca | Robert J. Jenkins | not in round 1 | preimage | 
| MeshHash | Björn Fay | conceded broken | 2nd preimage | 
| NKS2D | Geoffrey Park | not in round 1 | collision | 
| Ponic | Peter Schmidt-Nielsen | not in round 1 | 2nd-preimage | 
| StreamHash | Michal Trojnara | conceded broken | collision | 
| Tangle | Rafael Alvarez | conceded broken | collision | 
| WaMM | John Washburn | conceded broken | collision | 
| Waterfall | Bob Hattersley | conceded broken | collision | 
Your analysis is not mentioned? Drop a line at sha3zoo@iaik.tugraz.at to let us know!