Inside SHA-3
The National Institute of Standards and Technology (NIST) has selected a new cryptographic hash algorithm through a public competition. The new hash algorithm is referred to as the Secure Hash Algorithm 3 (SHA-3) and is intended to complement the SHA-2 hash algorithms currently specified in Federal...
Gespeichert in:
Veröffentlicht in: | IEEE potentials 2013-11, Vol.32 (6), p.26-31 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The National Institute of Standards and Technology (NIST) has selected a new cryptographic hash algorithm through a public competition. The new hash algorithm is referred to as the Secure Hash Algorithm 3 (SHA-3) and is intended to complement the SHA-2 hash algorithms currently specified in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard. The selected algorithm is intended to be suitable for use by the U.S. government as well as the private sector and is available royalty-free worldwide. |
---|---|
ISSN: | 0278-6648 1558-1772 |
DOI: | 10.1109/MPOT.2013.2254508 |