Receive industry and products news from the market categories that matter to you most.
Stay up to date on industry news and trends, product announcements and the latest innovations.
NIST receives submissions for hash algorithm.
Press Release Summary:
Nov 14, 2008 - NIST has received total of 64 submissions for competition to develop cryptographic hash algorithm, a tool that converts file, message, or block of data into short fingerprint for use in digital signatures, message authentication, and other computer security applications. Algorithm ultimately chosen by NIST will be called Secure Hash Algorithm-3 and will augment hash algorithms currently specified in FIPS 180-3, Secure Hash Standard.
Original Press Release
NIST Receives 64 Submissions for New 'Hash' Algorithm
Press release date: Nov 12, 2008
The hash algorithm ultimately chosen by NIST will be called Secure Hash Algorithm-3 (SHA-3) and will augment the hash algorithms currently specified in the Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard. FIPS standards are required for use in federal civilian computer systems and are often adopted voluntarily by private industry. (See "NIST Issues Call for a New 'Hash' Algorithm," NIST Tech Beat, Nov. 8, 2007.)
The 64 submissions are currently being reviewed; they come from groups as small as one individual and as large as 15 people. Those groups whose entries are determined to be "complete and proper" according to the competition rules will be considered "first-round candidates" and they will be posted on the NIST Web site for the competition at www.nist.gov/hash-competition.
Don't miss the latest news!