Abstract
In October 2012 the U.S. National Institute of Standards and Technology announced the new Secure Hash Algorithm SHA-3, which will be adopted as standard from now on. After a five-year process of public selection, the winner among a total of 73 candidates was Keccak.
This paper is focused on the analysis both from the points of view of security and implementation of the Keccak function, which is the base of the new SHA-3 standard. In particular, an implementation in the Android mobile platform is presented here, providing the first known external library in this operating system so that any Android developer can now use the new standard hashing. Finally, some SHA-3 applications in the Internet of Things are mentioned.
Research supported by the MINECO of Spain and the FEDER Fund under Project TIN2011-25452 and IPT-2012-0585-370000, and the FPI scholarship BES-2012-051817.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Andreeva, E., Mennink, B., Preneel, B.: Security reductions of the second round SHA-3 candidates. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 39–53. Springer, Heidelberg (2011)
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document (2009), http://keccak.noekeon.org/Keccak-main-2.1.pdf
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission, http://keccak.noekeon.org/Keccak-submission-3.pdf
Caballero-Gil, P., Hernandez-Goya, C.: Zero-knowledge hierarchical authentication in MANETs. IEICE Transactions on Information and Systems E89D(3), 1288–1289 (2006)
Chang, S., Perlner, R., Burr, W., Turan, M., Kelsey, J., Paul, S., Bassham, L.: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition, NIST (2012), http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7896.pdf
Homsirikamol, E., Rogawski, M., Gaj, K.: Comparing Hardware Performance of Fourteen Round two SHA-3 Candidates using FPGAs, Cryptology ePrint Archive, Report 2010/445, 210 (January 15, 2011), http://eprint.iacr.org/2010/445
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Martín-Fernández, F., Caballero-Gil, P. (2013). Analysis of the New Standard Hash Function. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory - EUROCAST 2013. EUROCAST 2013. Lecture Notes in Computer Science, vol 8111. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53856-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-53856-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-53855-1
Online ISBN: 978-3-642-53856-8
eBook Packages: Computer ScienceComputer Science (R0)