Advertisement

Analysis of the New Standard Hash Function

  • F. Martín-Fernández
  • P. Caballero-Gil
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8111)

Abstract

In October 2012 the U.S. National Institute of Standards and Technology announced the new Secure Hash Algorithm SHA-3, which will be adopted as standard from now on. After a five-year process of public selection, the winner among a total of 73 candidates was Keccak.

This paper is focused on the analysis both from the points of view of security and implementation of the Keccak function, which is the base of the new SHA-3 standard. In particular, an implementation in the Android mobile platform is presented here, providing the first known external library in this operating system so that any Android developer can now use the new standard hashing. Finally, some SHA-3 applications in the Internet of Things are mentioned.

Keywords

Hash Function Authentication Protocol Cryptographic Hash Function External Library Secure Hash Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Andreeva, E., Mennink, B., Preneel, B.: Security reductions of the second round SHA-3 candidates. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 39–53. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  2. 2.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document (2009), http://keccak.noekeon.org/Keccak-main-2.1.pdf
  3. 3.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission, http://keccak.noekeon.org/Keccak-submission-3.pdf
  4. 4.
    Caballero-Gil, P., Hernandez-Goya, C.: Zero-knowledge hierarchical authentication in MANETs. IEICE Transactions on Information and Systems E89D(3), 1288–1289 (2006)CrossRefGoogle Scholar
  5. 5.
    Chang, S., Perlner, R., Burr, W., Turan, M., Kelsey, J., Paul, S., Bassham, L.: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition, NIST (2012), http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7896.pdf
  6. 6.
    Homsirikamol, E., Rogawski, M., Gaj, K.: Comparing Hardware Performance of Fourteen Round two SHA-3 Candidates using FPGAs, Cryptology ePrint Archive, Report 2010/445, 210 (January 15, 2011), http://eprint.iacr.org/2010/445

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • F. Martín-Fernández
    • 1
  • P. Caballero-Gil
    • 1
  1. 1.Department of Statistics, Operations Research and ComputingUniversity of La LagunaSpain

Personalised recommendations