Analysis of the New Standard Hash Function
In October 2012 the U.S. National Institute of Standards and Technology announced the new Secure Hash Algorithm SHA-3, which will be adopted as standard from now on. After a five-year process of public selection, the winner among a total of 73 candidates was Keccak.
This paper is focused on the analysis both from the points of view of security and implementation of the Keccak function, which is the base of the new SHA-3 standard. In particular, an implementation in the Android mobile platform is presented here, providing the first known external library in this operating system so that any Android developer can now use the new standard hashing. Finally, some SHA-3 applications in the Internet of Things are mentioned.
KeywordsHash Function Authentication Protocol Cryptographic Hash Function External Library Secure Hash Algorithm
Unable to display preview. Download preview PDF.
- 2.Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document (2009), http://keccak.noekeon.org/Keccak-main-2.1.pdf
- 3.Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission, http://keccak.noekeon.org/Keccak-submission-3.pdf
- 5.Chang, S., Perlner, R., Burr, W., Turan, M., Kelsey, J., Paul, S., Bassham, L.: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition, NIST (2012), http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7896.pdf
- 6.Homsirikamol, E., Rogawski, M., Gaj, K.: Comparing Hardware Performance of Fourteen Round two SHA-3 Candidates using FPGAs, Cryptology ePrint Archive, Report 2010/445, 210 (January 15, 2011), http://eprint.iacr.org/2010/445