acm-header
Sign In

Communications of the ACM

ACM TechNews

The Next Secure Hash Algorithm Had Better Be a Good One


View as: Print Mobile App Share:

The National Institute of Standards and Technology is in the middle of a multi-year competition to pick the next hash algorithm, to be called SHA-3, which will be used to protect government files. Katholieke Universiteit Leuven professor Bart Preneel says SHA-3 will need to be sophisticated enough to withstand hacker attempts for the next 20 years. "It is unlikely there will be another competition [for SHA-4] before 2030," Preneel says.

However, some observers say the selection process is moving too quickly. "I think they should pick three winners, not one, and spend several years studying them," says former National Security Agency technology director Brian Snow.

The contest started with 51 algorithms, which were narrowed down to 14 in the first round. Researchers are now examining the 14 algorithms and are expected to pick a final five in late 2010. Both Snow and Preneel are concerned that not enough time is being given to thoroughly vet the remaining algorithms before a final choice is made.

From Government Computer News
View Full Article

 

Abstracts Copyright © 2010 Information Inc., Bethesda, Maryland, USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account