Skip to main content

Analysis of the New Standard Hash Function

  • Conference paper
Computer Aided Systems Theory - EUROCAST 2013 (EUROCAST 2013)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8111))

Included in the following conference series:

Abstract

In October 2012 the U.S. National Institute of Standards and Technology announced the new Secure Hash Algorithm SHA-3, which will be adopted as standard from now on. After a five-year process of public selection, the winner among a total of 73 candidates was Keccak.

This paper is focused on the analysis both from the points of view of security and implementation of the Keccak function, which is the base of the new SHA-3 standard. In particular, an implementation in the Android mobile platform is presented here, providing the first known external library in this operating system so that any Android developer can now use the new standard hashing. Finally, some SHA-3 applications in the Internet of Things are mentioned.

Research supported by the MINECO of Spain and the FEDER Fund under Project TIN2011-25452 and IPT-2012-0585-370000, and the FPI scholarship BES-2012-051817.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Andreeva, E., Mennink, B., Preneel, B.: Security reductions of the second round SHA-3 candidates. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 39–53. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document (2009), http://keccak.noekeon.org/Keccak-main-2.1.pdf

  3. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission, http://keccak.noekeon.org/Keccak-submission-3.pdf

  4. Caballero-Gil, P., Hernandez-Goya, C.: Zero-knowledge hierarchical authentication in MANETs. IEICE Transactions on Information and Systems E89D(3), 1288–1289 (2006)

    Article  Google Scholar 

  5. Chang, S., Perlner, R., Burr, W., Turan, M., Kelsey, J., Paul, S., Bassham, L.: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition, NIST (2012), http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7896.pdf

  6. Homsirikamol, E., Rogawski, M., Gaj, K.: Comparing Hardware Performance of Fourteen Round two SHA-3 Candidates using FPGAs, Cryptology ePrint Archive, Report 2010/445, 210 (January 15, 2011), http://eprint.iacr.org/2010/445

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Martín-Fernández, F., Caballero-Gil, P. (2013). Analysis of the New Standard Hash Function. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory - EUROCAST 2013. EUROCAST 2013. Lecture Notes in Computer Science, vol 8111. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53856-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-53856-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-53855-1

  • Online ISBN: 978-3-642-53856-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics