Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

NIST declares 'Keccak' SHA-3 winner after five-year competition

New security star

Article comments

After a public competition lasting five years, NIST (National Institute of Standards and Technology) has chosen the wonderfully-named ‘Keccak’ to be the newest cornerstone of the global security architecture, the SHA-3 hash function.

Pronounced “catch-ack” (it makes sense if you say it aloud), the hash is the invention of a group of semiconductor boffins, Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP Semiconductors.

Although it probably won’t reach widespread use for years, the SHA-3 (Secure Hash Algorithm -3) is important. It was invented to patch theoretical flaws in the current SHA-2 hash family used as a key authentication mechanism in digital signatures, and protocols such as SSL (and its successor TLS), SSH, and IPSec as well as in popular encryption-based programs such PGP and Skype.

NIST said Keccak had been chosen from 64 competition rivals because of its good performance in hardware – better than SHA-2 for a start – plus its ability to work across a range of devices of varying computing power.

Its inventors promoted Keccak on the basis of, among other qualities, its ‘sponge’ function, basically the mathematical design from which the hash is securely computed.

“Keccak has the added advantage of not being vulnerable in the same ways SHA-2 might be,” said NIST expert, Tim Polk. “An attack that could work on SHA-2 most likely would not work on Keccak because the two algorithms are designed so differently.”

But what is a hash function and what makes it different from encryption?

The easiest way of explaining this is to use a program such as Skype as an example. Skype encrypts the data it sends using AES; the hash (in fact one of a number of individual hashes within SHA-2) is used to ensure the secure communication of elements such as the user login without which the use of data encryption would be moot. This checking mechanism is utterly fundamental to Internet security.

SHA isn’t overhauled very often for the obvious practical reason that it doesn’t need to be until the established version has been shown to be insecure, or potentially insecure. When it is, it is announced well in advance of implementation.

Even security luminary Bruce Schneier declared himself happy with the result despite having submitted his 'Skein' as a rival option to Keccak.

“It's a fine choice. I'm glad that SHA-3 is nothing like the SHA-2 family; something completely different is good,” he announced in his blog.

“Congratulations to the Keccak team. Congratulations - and thank you - to NIST for running a very professional, interesting, and enjoyable competition. The process has increased our understanding about the cryptanalysis of hash functions by a lot,” he added.

“Keccak is a fine hash function; I have absolutely no reservations about its security.”


More from Techworld

More relevant IT news


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *