NaSHA is a hash function accepted as a first round SHA-3 candidate for the NIST hash function competition.
NaSHA was designed by Smile Markovski and Aleksandra Mileva with contributions by Simona Samardziski (programmer) and Boro Jakimovski (programmer). NaSHA supports internal state sizes of 1024 and 2048 bits, and arbitrary output sizes between 125 and 512 bits. It uses quasigroup string transformations with quasigroups of order 264, defined by extended Feistel networks.[1] The quasigroups used in every iteration of the compression function are different and depend on the processed message block.
The authors claim performance of up to 23.06 cycles per byte on an Intel Core 2 Duo in 64-bit mode.
Cryptanalysis during the SHA-3 competition has indicated that 384/512 version of NaSHA is susceptible to collision attacks,[2] but the authors disputed those attacks and also included small changes to achieve the strength of 224/256 version.
References
- ↑ S. Markovski, A. Mileva. "Generating huge quasigroups from small non-linear bijections via extended Feistel function". In Quasigroups and Related Systems, vol. 17, 2009, pp. 91-106.
- ↑ "NaSHA". The SHA-3 Zoo. http://ehash.iaik.tugraz.at/wiki/NaSHA. Retrieved July 7, 2009.
External links
- The official NaSHA website
- The First Round SHA-3 candidates
Cryptographic hash functions & message authentication codes |
|---|
- List
- Comparison
- Known attacks
| | Common functions |
- MD5
- SHA-1
- SHA-2
- SHA-3
- BLAKE2
|
|---|
| SHA-3 finalists |
- BLAKE
- Grøstl
- JH
- Skein
- Keccak (winner)
|
|---|
| Other functions |
- CubeHash
- ECOH
- FSB
- GOST
- HAS-160
- HAVAL
- Kupyna
- LM hash
- MD2
- MD4
- MD6
- MDC-2
- N-Hash
- RIPEMD
- RadioGatún
- SM3
- SWIFFT
- Snefru
- Streebog
- Tiger
- VSH
- Whirlpool
|
|---|
| Key derivation functions |
- Argon2
- Balloon
- bcrypt
- crypt
- Lyra2
- PBKDF2
- scrypt
|
|---|
| MAC functions |
- DAA
- CBC-MAC
- GMAC
- HMAC
- NMAC
- OMAC/CMAC
- PMAC
- VMAC
- UMAC
- Poly1305
- SipHash
|
|---|
Authenticated encryption modes | |
|---|
| Attacks |
- Collision attack
- Preimage attack
- Birthday attack
- Brute-force attack
- Rainbow table
- Side-channel attack
- Length extension attack
|
|---|
| Design |
- Avalanche effect
- Hash collision
- Merkle–Damgård construction
- Sponge function
- HAIFA construction
|
|---|
| Standardization |
- CRYPTREC
- NESSIE
- NIST hash function competition
|
|---|
| Utilization |
- Hash-based cryptography
- Key stretching
- Merkle tree
- Message authentication
- Proof of work
- Salt
- Pepper
|
|---|
|
|
Cryptography |
|---|
- History of cryptography
- Cryptanalysis
- Outline of cryptography
|
- Symmetric-key algorithm
- Block cipher
- Stream cipher
- Public-key cryptography
- Cryptographic hash function
- Message authentication code
- Random numbers
- Steganography
|
Category
|
|
 | Original source: https://en.wikipedia.org/wiki/NaSHA. Read more |