{"title":"Explanation of Sha-3 Algorithm by the Third Round Activities","authors":"Fang Pang, Lili Liu","doi":"10.1109/ICCSEE.2012.225","DOIUrl":null,"url":null,"abstract":"On Dec. 10, 2010, the NIST declares the fore five algorithms for SHA-3 competition: Keccak, Skein, JH, Grøstl, BLAKE. In this paper, we introduce the five candidates. The news extension of BLAKE uses the Mode of LAKE. Grøstl follows the design principles of AES. JH uses the cycle structure of SPN. Keccak adopts the sealing sponge structure. SKEIN is a one-way function which is extended from the design of Three fish group password. After introducing and comparing the five candidates, we made a list of their respective characteristics.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"406 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Computer Science and Electronics Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSEE.2012.225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
On Dec. 10, 2010, the NIST declares the fore five algorithms for SHA-3 competition: Keccak, Skein, JH, Grøstl, BLAKE. In this paper, we introduce the five candidates. The news extension of BLAKE uses the Mode of LAKE. Grøstl follows the design principles of AES. JH uses the cycle structure of SPN. Keccak adopts the sealing sponge structure. SKEIN is a one-way function which is extended from the design of Three fish group password. After introducing and comparing the five candidates, we made a list of their respective characteristics.