Hash function competition: security and implementation issues
Ferrer, Daniel F., Library Systems
Willoughby, Eric, Library Systems, Tang, Chuxia
Copyright 2007 by Central Michigan University. Intellectual Property Rights owned by Ferrer, Daniel F., Willoughby, Eric, Tang, Chuxia. This material is copyrighted, and any further reproduction or distribution is prohibited without the permission of the copyright owner.
Secure Hash Standard Competition; National Institute of Standards and Technology (NIST); Cryptographic hash algorithm; Cryptographic protocols; MD5; SHA-1; Advanced Encryption Standard (AES); National Security Agency/Central Security Service (NSA/CSS); Timing attacks; Cryptosystems; Side channel attacks; Cache-timing attacks; Simple power-analysis attacks (SPA); Differential power analysis (DPA); Hashing (Computer science); Data encryption (Computer science) -- Standards; Cryptography; Computer security;
U.S. Department of Commerce's National Institute of Standards and Technology (NIST) announced the instigation of an effort to develop new cryptographic hash algorithm(s) for the revision of Federal Information Processing Standard (FIPS) 180-2, the Secure Hash Standard. The purpose of this paper was to analyze NIST's hash function competition with regard to security and implementation issues. The current hash functions such as MD5 and SHA-1 are used extensively in security transactions over the Internet. This paper does not propose a new hash algorithm, but reviews the past selection processes and makes recommendation for a change in the process of selecting a new hash function.