We seek to understand and document all radio transmissions, legal and otherwise, as part of the radio listening hobby. We do not encourage any radio operations contrary to regulations. Always consult with the appropriate authorities if you have questions concerning what is permissible in your locale.

Author Topic: An algorithm to replace the Secure Hash Algorithm 2 (SHA-2)  (Read 3009 times)

Fansome

  • Guest
An algorithm to replace the Secure Hash Algorithm 2 (SHA-2)
« on: November 19, 2008, 2145 UTC »
An Algorithm With No Secrets
Technology Review (11/18/08) Naone, Erica

The National Institute of Standards and Technology (NIST) is organizing a competition to find an algorithm to replace the Secure Hash Algorithm 2 (SHA-2), which is becoming outdated.  NIST plans to release a short list of the best entries by the end of November, the beginning of a four-year-long process to find the overall winner.  In 2005, Tsinghua University Center for Advanced Study professor Xiaoyun Wang found weaknesses in several related hashing algorithms, and since then Wang and others have found faults in several other hashing schemes, causing officials to worry that SHA-2 also may eventually be found to be vulnerable.  A hash algorithm creates a digital fingerprint for messages that keep them secure during transit, but it is only considered secure if there is no practical way of running it backward and finding the original message from the fingerprint.  There also cannot be a way of producing two messages with the same exact fingerprint.  The weaknesses discovered by Wang and others relate to this problem, which cryptographers call a collision.  It is impossible to completely avoid collisions, but the best algorithms make collisions extremely hard to produce.  "Hash functions are the most widely used and the most poorly understood cryptographic primitives," says BT Counterpane's Bruce Schneier.  "It's possible that everything gets broken here, simply because we don't really understand how hash functions work."  NIST already has received 64 entries and is counting on cryptographers to narrow the list.
http://www.technologyreview.com/computing/21682/?a=f

 

HFUnderground T-Shirt
HFUnderground T-Shirt
by MitchellTimeDesigns