首页    期刊浏览 2024年10月06日 星期日
登录注册

文章基本信息

  • 标题:Cryptanalysis of SHA-3 Candidates: A Survey
  • 本地全文:下载
  • 作者:Shilpa Chauhan ; Rajeev Sobti ; G. Geetha
  • 期刊名称:Research Journal of Information Technology
  • 印刷版ISSN:1815-7432
  • 电子版ISSN:2151-7959
  • 出版年度:2013
  • 卷号:5
  • 期号:2
  • 页码:149-159
  • DOI:10.3923/rjit.2013.149.159
  • 出版社:Academic Journals Inc., USA
  • 摘要:The final round SHA-3 candidate algorithms are BLAKE, Skein, Groestl, Keccak and JH. This study brings together all the cryptanalysis performed on the five finalist algorithms in the Cryptographic Hash Algorithm Competition organized by NIST. In this study, one section for each candidate algorithm is dedicated to discuss the cryptanalysis results in detail. The timeline of the attacks, the manner in which it was attacked, analysis of the attacks and the success rate of the authors are elaborated in this study. A great deal of contributions is made by the cryptanalysts all around the globe and we have compiled all the results together with our own criticisms to take a better view of the cryptanalysis status of SHA-3 finalists.
国家哲学社会科学文献中心版权所有