Cryptology ePrint Archive: Report 2008/511

Classification of the SHA-3 Candidates

Ewan Fleischmann and Christian Forler and Michael Gorski

Abstract: In this note we give an overview on the current state of the SHA-3 candidates. First, we classify all publicly known candidates and, second, we outline and summarize the performance data as given in the candidates documentation for 64-bit and 32-bit implementations. We define performance classes and classify the hash algorithms. Note, that this article will be updated as soon as new candidates arrive or new cryptanalytic results get published. Comments to the authors of this article are welcome.

Category / Keywords: secret-key cryptography / hash function, SHA-3, classification

Date: received 3 Dec 2008, last revised 19 Apr 2009

Contact author: {Ewan Fleischmann, Michael Gorski} (at) uni-weimar de

Available format(s): PDF | BibTeX Citation

Version: 20090419:140227 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]