Sunday, April 24, 2011

Updating Hash Security: NIST SHA-3

The NIST (National Institute of Standards and Technology) is holding a competition aimed at finding the best possible replacement for the cureent SHAs (Secure Hash Algorithms) — SHA-1 and SHA-2. Cryptographers are submitting new mathematical algorithms in order to develop a more secure and robust substitute that will strengthen the hash functions that are used in digital signatures, call-message authentication and several other secure protocols on the Internet that help prevent attacks and keep digital information secure


The NIST (National Institute of Standards and Technology) is holding a competition aimed at finding the best possible replacement for the cureent SHAs (Secure Hash Algorithms) — SHA-1 and SHA-2. Cryptographers are submitting new mathematical algorithms in order to develop a more secure and robust substitute that will strengthen the hash functions that are used in digital signatures, call-message authentication and several other secure protocols on the Internet that help prevent attacks and keep digital information secure

0 comments:

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Vamshi krishnam raju | Bloggerized by Vamshi krishnam raju - Vamshi krishnam raju | Vamshi krishnam raju