acm-header
Sign In

Communications of the ACM

ACM News

Cryptographers Chosen to Duke It Out in Final Fight


View as: Print Mobile App Share:

A competition to find a replacement for one of the gold-standard computer security algorithms used in almost all secure, online transactions just heated up.

The list of possibilities for Secure Hash Algorithm-3, or SHA-3, has been narrowed down to five finalists. They now face the onslaught of an international community of "cryptanalysts" – who will analyse the algorithms for weaknesses – before just one is due to be selected as the winner in 2012.

The competition, which is being run by the US National Institute of Standards and Technology in Gaithersburg, Maryland, is a huge deal for cryptographers and cryptanalysts alike. "These are incredibly competitive people. They just love this," says William Burr of NIST. "It's almost too much fun. For us, it's a lot of work."

From New Scientist
View Full Article


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account