Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Submissions due for US super algorithm competition

But winner will have three year wait.

Article comments

Security experts vying to have their technology selected as the next cryptographic-hash algorithm standard for the US government have until this week to submit their entries.

However, they will have a long wait ahead, as the new Secure Hash Algorithm standard isn't expected to be chosen until 2012.

A cryptographic hash algorithm allows for functions such as digital signatures, content verification and other security processes, including malware scanning. The current Secure Hash Algorithm (SHA) variants SHA-1 and SHA-2 aren't yet thought to be broken, but serious attacks against their core have been known for some time.

With an eye on finding a better crypto hash algorithm, the National Institute of Standards and Technology (NIST) last year announced it was holding a competition to review public entries for a hoped-for new standard.

One contender, which was disclosed today, is "Skein," developed by Bruce Schneier with colleagues Niels Ferguson, Stefan Lucks, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas and Jesse Walker.

Working together as friends, these security experts have jobs at Microsoft, Bauhaus-Universitat Weimar, BT Group, Hifn, the University of California, the University of Washington, PGP and Intel.

Although Skein may look like something from some "powerful industry consortium," its creators point out in their 75-page document submission that this is not the case.

"Our employers have kindly agreed to let us do this work, but most of it was done on our own time," Skein's creators say. "Really, they have only the vaguest idea what we're doing." The Skein collective adds: "We had lots of fun."

Skein "is really fast, really flexible," says Schneier, chief security technology officer of BT Group. "It's really simple and secure."

The Skein algorithm family works from 256-bit to 1,024-bit in strength, 512-bit representing the primary proposal. "Skein-256 is our low-memory variant," the Skein document states, while "Skein-1024 is our ultra-conservative variant." The block cipher at the core of Skein is called Threefish.

About 40 submissions in total are anticipated as entries in the NIST crypto hash algorithm contest. A tough public review of algorithm candidates will begin in earnest at a NIST conference next year. NIST's goal is to select a new hash standard in 2012 after a full public review of the finalists that manage to make it through the rigorous process of critical analysis from experts around the world.

NIST notes that such a lengthy process worked well in selecting the Advanced Encryption Standard back in 2002 as the more modern symmetric cipher to replace the aging Data Encryption Standard.


More from Techworld

More relevant IT news



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *