Classification of the SHA-3 Candidates

In this note we give an overview on the current state of the SHA-3 candidates. First, we classify all publicly known candidates and, second, we outline and summarize the performance data as given in the candidates documentation for $64$-bit and $32$-bit implementations. We define performance classes and classify the hash algorithms. Note, that this article will be updated as soon as new candidates arrive or new cryptanalytic results get published. Comments to the authors of this article are welcome.

[1]  Joachim Rosenthal,et al.  Maximum Distance Separable Convolutional Codes , 1999, Applicable Algebra in Engineering, Communication and Computing.

[2]  Michael E. Kounavis,et al.  Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication , 2008, ISC.

[3]  David A. Wilson,et al.  The DCH Hash Function , 2008 .

[4]  Olivier Billet , .

[5]  Niels Ferguson,et al.  Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform , 2009, IACR Cryptol. ePrint Arch..

[6]  Dai Watanabe,et al.  Second Preimage Attack on SHAMATA-512 , 2009, INDOCRYPT.

[7]  Mohamed El-Hadedy,et al.  Cryptographic hash function Edon-R′ , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.

[8]  Ronald L. Rivest The MD 6 hash function A proposal to NIST for SHA-3 , 2008 .

[9]  C. Cannière Hash Function Luffa Supporting Document , 2008 .

[10]  Vlastimil Klíma Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n , 2009, IACR Cryptol. ePrint Arch..

[11]  Michael E. Kounavis,et al.  Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication , 2008, IACR Cryptol. ePrint Arch..

[12]  Anne Canteaut,et al.  Internal collision attack on Maraca , 2009, Symmetric Cryptography.

[13]  Bart Preneel,et al.  The Lane hash function , 2009, Symmetric Cryptography.

[14]  A New Hash Algorithm: Khichidi-1 , 2008, IACR Cryptol. ePrint Arch..

[15]  Iwata Tetsu,et al.  AURORA: A Cryptographic Hash Algorithm Family , 2009 .

[16]  Alex Biryukov,et al.  Hash family LUX-Algorithm Specifications and Supporting Documentation , 2008 .

[17]  Bruce Schneier,et al.  Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..

[18]  P. Gaborit,et al.  SHA-3 proposal: FSB , 2008 .

[19]  Hongjun Wu,et al.  The Hash Function JH , 2009 .

[20]  Bart Preneel,et al.  Practical Preimages for Maraca , 2009, Symmetric Cryptography.

[21]  Kasteelpark Arenberg,et al.  The Hash Function Hamsi , 2008 .

[22]  E. Biham,et al.  The SHAvite-3 Hash Function , 2008 .

[23]  ZiJie Xu Dynamic SHA , 2007, IACR Cryptol. ePrint Arch..

[24]  Yixian Yang,et al.  Collision attack on NaSHA-384/512 , 2010, 2010 International Conference on Networking and Information Technology.

[25]  Alon Rosen,et al.  SWIFFTX : A Proposal for the SHA-3 Standard , 2008 .

[26]  Mohamed El-Hadedy,et al.  Cryptographic hash function Blue Midnight Wish , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.

[27]  Bart Preneel,et al.  Practical Collisions for SHAMATA-256 , 2009, Selected Areas in Cryptography.

[28]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[29]  Neil Sholer,et al.  Abacus : A Candidate for SHA-3 , 2008 .

[30]  Stefan Lucks,et al.  Design Principles for Iterated Hash Functions , 2004, IACR Cryptol. ePrint Arch..

[31]  Willi Meier,et al.  SHA-3 proposal BLAKE , 2009 .

[32]  Thomas Peyrin,et al.  Inside the Hypercube , 2009, ACISP.

[33]  Ivica Nikolic,et al.  Cryptanalysis of EnRUPT , 2008, IACR Cryptol. ePrint Arch..

[34]  Stefan Lucks,et al.  The Skein Hash Function Family , 2009 .

[35]  Florian Mendel,et al.  Cryptanalysis of Twister , 2009, ACNS.

[36]  Bruce Schneier,et al.  Unbalanced Feistel Networks and Block Cipher Design , 1996, FSE.

[37]  S. A. V. Satya Murty,et al.  Huge 2ndpreimages and collisions of khichidi-1 , 2009, IACR Cryptol. ePrint Arch..

[38]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[39]  Christophe De Canniere Hash Function Lua Supporting Document , 2008 .

[40]  Florian Mendel,et al.  Collision Attack on Boole , 2009, ACNS.

[41]  Scott R. Fluhrer Collision Attack on the Waterfall Hash Function , 2008, IACR Cryptol. ePrint Arch..

[42]  Florian Mendel,et al.  Symmetric Cryptography , 2009 .