Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Welcome Guest | Log In | Register | Benefits
Channels ▼
RSS

Security

Keccak: The New SHA-3 Encryption Standard



Related Reading


More Insights




Dan Taflin

The "run bits" test as presented here is far too simplistic to be of any use. All of the "skews" between left and right halves are well within a single standard deviation for a binomial distribution. That, and the fact that the skews were toward different halves in the different tests seems to more strongly support the null hypothesis of no skew than anything else.

On the other hand, the cascade rate test result does concern me. I have routinely assumed that even a small change in input text should result in a radical change in hash output. We'll have to be much more careful to salt every hash input to avoid difficulties.

Jonathan Leffler

It is a little surprising to see the Secure HASH Algorithm 3 being described as an encryption technique — it is not an encryption technique at all, but a hash algorithm. The primary difference is that encryption is reversible if you know the relevant key; hash algorithms are not.

jdluzen

For those of you who are interested in a pure C# port including inheritance from HashAlgorithm, you can check out https://bitbucket.org/jdluz... or https://nuget.org/packages/.... It includes tests using the unmodified test vectors.