DocumentCode :
1902758
Title :
Explanation of Sha-3 Algorithm by the Third Round Activities
Author :
Pang, Fang ; Liu, Lili
Author_Institution :
Sch. of Comput. Sci. & Technol., China Univ. of Min. & Technol., Xuzhou, China
Volume :
3
fYear :
2012
fDate :
23-25 March 2012
Firstpage :
711
Lastpage :
714
Abstract :
On Dec. 10, 2010, the NIST declares the fore five algorithms for SHA-3 competition: Keccak, Skein, JH, Grøstl, BLAKE. In this paper, we introduce the five candidates. The news extension of BLAKE uses the Mode of LAKE. Grøstl follows the design principles of AES. JH uses the cycle structure of SPN. Keccak adopts the sealing sponge structure. SKEIN is a one-way function which is extended from the design of Three fish group password. After introducing and comparing the five candidates, we made a list of their respective characteristics.
Keywords :
cryptography; AES design principles; Grøstl algorithms; JH algorithms; Keccak algorithms; Mode BLAKE algorithms; NIST; SPN cycle structure; Sha-3 algorithm; Skein algorithms; Three fish group password; sealing sponge structure; third round activities; Algorithm design and analysis; Cryptography; Educational institutions; Hardware; NIST; Software; Candidate algorithms; SHA-3; comparison;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4673-0689-8
Type :
conf
DOI :
10.1109/ICCSEE.2012.225
Filename :
6188204
Link To Document :
بازگشت