Due to recent attacks on the SHA-1 hash function specified in FIPS 180-2 , Secure Hash Standard, NIST is initiating the development of one or more additional hash algorithms through a public competition, similar to the development process for the Advanced Encryption Standard (AES). Two workshops (see menu at left) have been held to assess the status of NIST-approved hash functions, to discuss possible near- and long-term options, and to discuss hash function research in preparation for initiating such a competition. In addition, NIST has published its policy on the use of the current hash functions, and has proposed a tentative timeline for developing the new hash functions (will be posted at a later date).
As a first step in launching a hash function competition, NIST is publishing draft minimum acceptability requirements, submission requirements, and evaluation criteria for candidate functions, and public comment is requested.