Misplaced Pages

NaSHA

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "NaSHA" – news · newspapers · books · scholar · JSTOR (July 2009) (Learn how and when to remove this message)

NaSHA is a hash function accepted as a first round SHA-3 candidate for the NIST hash function competition.

NaSHA was designed by Smile Markovski and Aleksandra Mileva with contributions by Simona Samardziski (programmer) and Boro Jakimovski (programmer). NaSHA supports internal state sizes of 1024 and 2048 bits, and arbitrary output sizes between 125 and 512 bits. It uses quasigroup string transformations with quasigroups of order 2, defined by extended Feistel networks. The quasigroups used in every iteration of the compression function are different and depend on the processed message block.

The authors claim performance of up to 23.06 cycles per byte on an Intel Core 2 Duo in 64-bit mode.

Cryptanalysis during the SHA-3 competition has indicated that 384/512 version of NaSHA is susceptible to collision attacks, but the authors disputed those attacks and also included small changes to achieve the strength of 224/256 version.

References

  1. S. Markovski, A. Mileva. "Generating huge quasigroups from small non-linear bijections via extended Feistel function". In Quasigroups and Related Systems, vol. 17, 2009, pp. 91-106.
  2. "NaSHA". The SHA-3 Zoo. Retrieved July 7, 2009.

External links

Cryptographic hash functions and message authentication codes
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
Cryptography
General
Mathematics
Stub icon

This cryptography-related article is a stub. You can help Misplaced Pages by expanding it.

Categories: