Difference between revisions of "The SHA-3 Zoo"
Mschlaeffer (talk | contribs) m |
(Blender, MeshHash, NaSha labelled "broken") |
||
Line 1: | Line 1: | ||
The SHA-3 Zoo (work in progress) is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (see also [http://en.wikipedia.org/wiki/SHA-3 here]). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all [[SHA-3 submitters]] is also available. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates. Another categorization of the SHA-3 submissions can be found [http://www.uni-weimar.de/cms/fileadmin/medien/medsicherheit/Research/SHA3/Classification_of_the_SHA-3_Candidates.pdf here]. | The SHA-3 Zoo (work in progress) is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (see also [http://en.wikipedia.org/wiki/SHA-3 here]). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all [[SHA-3 submitters]] is also available. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates. Another categorization of the SHA-3 submissions can be found [http://www.uni-weimar.de/cms/fileadmin/medien/medsicherheit/Research/SHA3/Classification_of_the_SHA-3_Candidates.pdf here]. | ||
<br><br> | <br><br> | ||
− | At this time, 55 out of 64 submissions to the SHA-3 competition are publicly known and available. [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/submissions_rnd1.html 51] submissions have advanced to the first round (so far, | + | At this time, 55 out of 64 submissions to the SHA-3 competition are publicly known and available. [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/submissions_rnd1.html 51] submissions have advanced to the first round (so far, 17 of 51 first round candidates have been broken). |
Line 18: | Line 18: | ||
| [[BLAKE]] || 1st round || none | | [[BLAKE]] || 1st round || none | ||
|- | |- | ||
− | | [[Blender]] || 1st round || | + | | [[Blender]] || 1st round || broken |
|- | |- | ||
| [[Blue Midnight Wish]] || 1st round || yes | | [[Blue Midnight Wish]] || 1st round || yes | ||
Line 78: | Line 78: | ||
| [[MD6]] || 1st round || yes | | [[MD6]] || 1st round || yes | ||
|- | |- | ||
− | | [[MeshHash]] || 1st round || | + | | [[MeshHash]] || 1st round || broken |
|- | |- | ||
− | | [[NaSHA]] || 1st round || | + | | [[NaSHA]] || 1st round || broken |
|- | |- | ||
| [[NKS2D]] || submitted || broken | | [[NKS2D]] || submitted || broken |
Revision as of 12:04, 23 December 2008
The SHA-3 Zoo (work in progress) is a collection of cryptographic hash functions (in alphabetical order) submitted to the SHA-3 contest (see also here). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all SHA-3 submitters is also available. For a software performance related overview, see eBASH. At a separate page, we also collect hardware implementation results of the candidates. Another categorization of the SHA-3 submissions can be found here.
At this time, 55 out of 64 submissions to the SHA-3 competition are publicly known and available. 51 submissions have advanced to the first round (so far, 17 of 51 first round candidates have been broken).
Recent updates of the SHA-3 Zoo
Hash Function Name | Status | External Cryptanalysis |
---|---|---|
Abacus | 1st round | broken |
ARIRANG | 1st round | none |
AURORA | 1st round | none |
BLAKE | 1st round | none |
Blender | 1st round | broken |
Blue Midnight Wish | 1st round | yes |
Boole | 1st round | broken |
Cheetah | 1st round | broken |
CHI | 1st round | none |
CRUNCH | 1st round | none |
CubeHash | 1st round | yes |
DCH | 1st round | broken |
Dynamic SHA | 1st round | broken |
Dynamic SHA2 | 1st round | broken |
ECHO | 1st round | none |
ECOH | 1st round | none |
Edon-R | 1st round | yes |
EnRUPT | 1st round | broken |
ESSENCE | 1st round | none |
FSB | 1st round | none |
Fugue | 1st round | none |
Grøstl | 1st round | yes |
Hamsi | 1st round | none |
HASH 2X | submitted | broken |
JH | 1st round | yes |
Keccak | 1st round | none |
Khichidi-1 | 1st round | broken |
LANE | 1st round | none |
Lesamnta | 1st round | none |
Luffa | 1st round | none |
LUX | 1st round | yes |
Maraca | submitted | broken |
MCSSHA-3 | 1st round | broken |
MD6 | 1st round | yes |
MeshHash | 1st round | broken |
NaSHA | 1st round | broken |
NKS2D | submitted | broken |
Ponic | submitted | broken |
SANDstorm | 1st round | none |
Sarmal | 1st round | yes |
Sgàil | 1st round | broken |
Shabal | 1st round | none |
SHAMATA | 1st round | yes |
SHAvite-3 | 1st round | none |
SIMD | 1st round | none |
Skein | 1st round | none |
Spectral Hash | 1st round | yes |
StreamHash | 1st round | broken |
SWIFFTX | 1st round | none |
Tangle | 1st round | broken |
TIB3 | 1st round | none |
Twister | 1st round | yes |
Vortex | 1st round | yes |
WaMM | 1st round | broken |
Waterfall | 1st round | broken |
Your analysis is not mentioned? Drop a line at sha3zoo@iaik.tugraz.at to let us know!