Difference between revisions of "The SHA-3 Zoo"
m |
Mschlaeffer (talk | contribs) m |
||
Line 1: | Line 1: | ||
The SHA-3 Zoo is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (work in progress). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all [[SHA-3 submitters]] is also available. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates. Another categorization of the SHA-3 submissions can be found [http://www.uni-weimar.de/cms/fileadmin/medien/medsicherheit/Research/SHA3/Classification_of_the_SHA-3_Candidates.pdf here]. | The SHA-3 Zoo is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (work in progress). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all [[SHA-3 submitters]] is also available. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates. Another categorization of the SHA-3 submissions can be found [http://www.uni-weimar.de/cms/fileadmin/medien/medsicherheit/Research/SHA3/Classification_of_the_SHA-3_Candidates.pdf here]. | ||
<br><br> | <br><br> | ||
− | At this time, | + | At this time, 54 out of 64 submissions to the SHA-3 competition are publicly known and available, and hence take advantage of early external cryptanalysis (so far, 9 submissions have been broken). |
Line 9: | Line 9: | ||
|- style="background:#efefef;" | |- style="background:#efefef;" | ||
! width="150"| Hash Function Name !! width="150"| Status !! width="150"| [[External Cryptanalysis Categories| External Cryptanalysis]] | ! width="150"| Hash Function Name !! width="150"| Status !! width="150"| [[External Cryptanalysis Categories| External Cryptanalysis]] | ||
+ | |- | ||
+ | | [[Abacus]] || submitted || none | ||
+ | |- | ||
+ | | [[ARIRANG]] || submitted || none | ||
+ | |- | ||
+ | | [[AURORA]] || submitted || none | ||
|- | |- | ||
| [[BLAKE]] || submitted || none | | [[BLAKE]] || submitted || none | ||
+ | |- | ||
+ | | [[Blender]] || submitted || none | ||
|- | |- | ||
| [[Blue Midnight Wish]] || submitted || yes | | [[Blue Midnight Wish]] || submitted || yes | ||
|- | |- | ||
| [[Boole]] || submitted || broken | | [[Boole]] || submitted || broken | ||
+ | |- | ||
+ | | [[Cheetah]] || submitted || none | ||
|- | |- | ||
| [[CHI]] || submitted || none | | [[CHI]] || submitted || none | ||
Line 22: | Line 32: | ||
| [[CubeHash]] || submitted || yes | | [[CubeHash]] || submitted || yes | ||
|- | |- | ||
− | | [[DCH]] | + | | [[DCH]] || submitted || broken |
+ | |- | ||
+ | | [[Dynamic SHA]] || submitted || none | ||
+ | |- | ||
+ | | [[Dynamic SHA2]] || submitted || none | ||
+ | |- | ||
+ | | [[ECHO]] || submitted || none | ||
+ | |- | ||
+ | | [[ECOH]] || submitted || none | ||
|- | |- | ||
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes | | [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes | ||
Line 35: | Line 53: | ||
|- | |- | ||
| [[Groestl|Grøstl]] || submitted || yes | | [[Groestl|Grøstl]] || submitted || yes | ||
+ | |- | ||
+ | | [[Hamsi]] || submitted || none | ||
|- | |- | ||
| [[HASH 2X]] || submitted || broken | | [[HASH 2X]] || submitted || broken | ||
|- | |- | ||
− | | [[JH]] | + | | [[JH]] || submitted || yes |
|- | |- | ||
| [[Keccak]] || submitted || none | | [[Keccak]] || submitted || none | ||
|- | |- | ||
− | | [[LANE]] | + | | [[Khichidi-1]] || submitted || none |
+ | |- | ||
+ | | [[LANE]] || submitted || none | ||
+ | |- | ||
+ | | [[Lesamnta]] || submitted || none | ||
+ | |- | ||
+ | | [[Luffa]] || submitted || none | ||
+ | |- | ||
+ | | [[LUX]] || submitted || none | ||
|- | |- | ||
| [[Maraca]] || submitted || none | | [[Maraca]] || submitted || none | ||
Line 50: | Line 78: | ||
| [[MD6]] || submitted || yes | | [[MD6]] || submitted || yes | ||
|- | |- | ||
− | | [[MeshHash]] | + | | [[MeshHash]] || submitted || yes |
|- | |- | ||
| [[NaSHA]] || submitted || yes | | [[NaSHA]] || submitted || yes | ||
Line 58: | Line 86: | ||
| [[Ponic]] || submitted || broken | | [[Ponic]] || submitted || broken | ||
|- | |- | ||
− | | [[SANDstorm]] | + | | [[SANDstorm]] || submitted || none |
|- | |- | ||
| [[Sarmal]] || submitted || yes | | [[Sarmal]] || submitted || yes | ||
|- | |- | ||
| [[Sgàil]] || submitted || broken | | [[Sgàil]] || submitted || broken | ||
+ | |- | ||
+ | | [[Shabal]] || submitted || none | ||
|- | |- | ||
| [[SHAMATA]] || submitted || yes | | [[SHAMATA]] || submitted || yes | ||
|- | |- | ||
− | | [[SIMD]] | + | | [[SHAvite-3]] || submitted || none |
+ | |- | ||
+ | | [[SIMD]] || submitted || none | ||
|- | |- | ||
| [[Skein]] || submitted || none | | [[Skein]] || submitted || none | ||
Line 72: | Line 104: | ||
| [[Spectral Hash]] || submitted || yes | | [[Spectral Hash]] || submitted || yes | ||
|- | |- | ||
− | | [[SWIFFTX]] | + | | [[SWIFFTX]] || submitted || none |
+ | |- | ||
+ | | [[Tangle]] || submitted || none | ||
+ | |- | ||
+ | | [[TIB3]] || submitted || none | ||
|- | |- | ||
− | | [[ | + | | [[Twister]] || submitted || none |
|- | |- | ||
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes | | [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes |
Revision as of 13:05, 11 December 2008
The SHA-3 Zoo is a collection of cryptographic hash functions (in alphabetical order) submitted to the SHA-3 contest (work in progress). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all SHA-3 submitters is also available. For a software performance related overview, see eBASH. At a separate page, we also collect hardware implementation results of the candidates. Another categorization of the SHA-3 submissions can be found here.
At this time, 54 out of 64 submissions to the SHA-3 competition are publicly known and available, and hence take advantage of early external cryptanalysis (so far, 9 submissions have been broken).
Recent updates of the SHA-3 Zoo
Hash Function Name | Status | External Cryptanalysis |
---|---|---|
Abacus | submitted | none |
ARIRANG | submitted | none |
AURORA | submitted | none |
BLAKE | submitted | none |
Blender | submitted | none |
Blue Midnight Wish | submitted | yes |
Boole | submitted | broken |
Cheetah | submitted | none |
CHI | submitted | none |
CRUNCH | submitted | none |
CubeHash | submitted | yes |
DCH | submitted | broken |
Dynamic SHA | submitted | none |
Dynamic SHA2 | submitted | none |
ECHO | submitted | none |
ECOH | submitted | none |
Edon-R | submitted | yes |
EnRUPT | submitted | broken |
ESSENCE | submitted | none |
FSB | submitted | none |
Fugue | submitted | none |
Grøstl | submitted | yes |
Hamsi | submitted | none |
HASH 2X | submitted | broken |
JH | submitted | yes |
Keccak | submitted | none |
Khichidi-1 | submitted | none |
LANE | submitted | none |
Lesamnta | submitted | none |
Luffa | submitted | none |
LUX | submitted | none |
Maraca | submitted | none |
MCSSHA-3 | submitted | broken |
MD6 | submitted | yes |
MeshHash | submitted | yes |
NaSHA | submitted | yes |
NKS2D | submitted | broken |
Ponic | submitted | broken |
SANDstorm | submitted | none |
Sarmal | submitted | yes |
Sgàil | submitted | broken |
Shabal | submitted | none |
SHAMATA | submitted | yes |
SHAvite-3 | submitted | none |
SIMD | submitted | none |
Skein | submitted | none |
Spectral Hash | submitted | yes |
SWIFFTX | submitted | none |
Tangle | submitted | none |
TIB3 | submitted | none |
Twister | submitted | none |
Vortex | submitted | yes |
WaMM | submitted | broken |
Waterfall | submitted | none |
Your submission is not on this list? Drop a line at sha3zoo@iaik.tugraz.at to let us know!