NIST’s Plan for New Cryptographic Hash Functions

Due to recent attacks on the SHA-1 hash function specified in FIPS 180-2 , Secure Hash Standard, NIST is initiating the development of one or more additional hash algorithms through a public competition, similar to the development process for the Advanced Encryption Standard (AES). Two workshops (see menu at left) have been held to assess the status of NIST-approved hash functions, to discuss possible near- and long-term options, and to discuss hash function research in preparation for initiating such a competition. In addition, NIST has published its policy on the use of the current hash functions, and has proposed a tentative timeline for developing the new hash functions (will be posted at a later date).

As a first step in launching a hash function competition, NIST is publishing draft minimum acceptability requirements, submission requirements, and evaluation criteria for candidate functions, and public comment is requested.

Workshop Reports (pdf files)


Related Posts

Read The Bible