Difference between revisions of "The SHA-3 Zoo"
From The ECRYPT Hash Function Website
Line 1: | Line 1: | ||
The SHA-3 Zoo is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (work in progress). It aims to provide an overview of design and cryptanalysis of all submissions. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates. | The SHA-3 Zoo is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (work in progress). It aims to provide an overview of design and cryptanalysis of all submissions. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates. | ||
<br><br> | <br><br> | ||
− | At this time, | + | At this time, 27 out of 64 submissions to the SHA-3 competition are publicly known and available, and take hence advantage of early external cryptanalysis. |
Line 24: | Line 24: | ||
|- | |- | ||
| [[ESSENCE]] || submitted || none | | [[ESSENCE]] || submitted || none | ||
+ | |- | ||
+ | | [[FSB (SHA-3 submission) | FSB]] || submitted || none | ||
|- | |- | ||
| [[Fugue]] || submitted || none | | [[Fugue]] || submitted || none |
Revision as of 17:42, 13 November 2008
The SHA-3 Zoo is a collection of cryptographic hash functions (in alphabetical order) submitted to the SHA-3 contest (work in progress). It aims to provide an overview of design and cryptanalysis of all submissions. For a software performance related overview, see eBASH. At a separate page, we also collect hardware implementation results of the candidates.
At this time, 27 out of 64 submissions to the SHA-3 competition are publicly known and available, and take hence advantage of early external cryptanalysis.
Hash Function Name | Status | External Cryptanalysis |
---|---|---|
BLAKE | submitted | none |
Blue Midnight Wish | submitted | none |
Boole | submitted | none |
CHI | submitted | none |
CubeHash | submitted | none |
Edon-R | submitted | none |
EnRUPT | submitted | broken |
ESSENCE | submitted | none |
FSB | submitted | none |
Fugue | submitted | none |
Grøstl | submitted | none |
HASH 2X | submitted | broken |
Keccak | submitted | none |
Maraca | submitted | none |
MCSSHA-3 | submitted | broken |
MD6 | submitted | yes |
NaSHA | submitted | none |
NKS2D | submitted | none |
Ponic | submitted | none |
Sarmal | submitted | none |
Sgàil | submitted | broken |
SHAMATA | submitted | none |
Skein | submitted | none |
Spectral Hash | submitted | none |
Vortex | submitted | none |
WaMM | submitted | broken |
Waterfall | submitted | none |
Your submission is not on this list? Drop a line at sha3zoo@iaik.tugraz.at to let us know!