Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Total Page:16
File Type:pdf, Size:1020Kb
NISTIR 7896 Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition Shu-jen Chang Ray Perlner William E. Burr Meltem Sönmez Turan John M. Kelsey Souradyuti Paul Lawrence E. Bassham http://dx.doi.org/10.6028/NIST.IR.7896 NISTIR 7896 Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition Shu-jen Chang Ray Perlner William E. Burr Meltem Sönmez Turan John M. Kelsey Souradyuti Paul Lawrence E. Bassham Computer Security Division Information Technology Laboratory http://dx.doi.org/10.6028/NIST.IR.7896 November 2012 U.S. Department of Commerce Rebecca M. Blank, Acting Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director ii Abstract The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007, to develop a new cryptographic hash algorithm – SHA-3, which will augment the hash algorithms specified in the Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard (SHS). The competition was NIST’s response to advances in the cryptanalysis of hash algorithms. NIST received sixty-four submissions in October 2008, and selected fifty-one first-round candidates on December 10, 2008; fourteen second-round candidates on July 24, 2009; and five third-round candidates – BLAKE, Grøstl, JH, Keccak and Skein, on December 9, 2010, to advance to the final round of the competition. Eighteen months were provided for the public review of the finalists, and on October 2, 2012, NIST announced the winning algorithm of the SHA-3 competition – Keccak. This report summarizes the evaluation of the five finalists and the selection of the SHA-3 winner. KEY WORDS: Cryptographic hash algorithm; Cryptographic hash function; Cryptography; Cryptographic hash competition; SHA-3 competition. iii Acknowledgements NIST thanks the submitters of all the candidate algorithms, especially the submitters of the SHA- 3 finalists for their continued diligence and support. NIST is also grateful for the efforts of those in the cryptographic community that provided security, implementation, and performance analyses of the candidate algorithms throughout the competition, and those who provided feedback on the hash forum or published papers on the various technical aspects of the candidates. Specifically, NIST thanks the organizers of the following projects: SHA-3 Zoo: Christian Rechberger, Jean-Phillipe Aumasson, Florian Mendel, Tomislav Nad, Martin Schläffer, Gilles van Assche; ECRYPT Benchmarking of All Submitted Hashes (eBASH): Daniel J. Bernstein, Tanja Lange; eXternal Benchmarking eXtension (XBX): Christian Wenzel-Benner, Jens Gräf; George Mason University Department of Electrical and Computer Engineering Hardware Benchmarking: Kris Gaj, Jens-Peter Kaps; Virginia Tech Department of Electrical and Computer Engineering ASIC Benchmarking: Patrick Schaumont, Leyla Nazhand-Ali; Eidgenössische Technische Hochschule Zürich (ETHZ) ASIC Implementation: Frank K. Gürkaynak; And the authors of the following reports: ECRYPT II SHA-3 Design and Cryptanalysis Report: Christian Rechberger, Tor E. Bjørstad, Joan Daemen, Christophe De Cannière, Praveen Gauravaram, Dmitry Khovratovich, Willi Meier, Tomislav Nad, Ivica Nikolić, Matt Robshaw, Martin Schläffer, Søren S. Thomsen, Elmar Tischhauser, Deniz Toz, Gilles Van Assche, Kerem Varıcı; ECRYPT II Intermediate Status Report: Praveen Gauravaram, Florian Mendel, María Naya-Plasencia, Vincent Rijmen, Deniz Toz; for their outstanding contributions and support to the SHA-3 competition. In addition, NIST extends its appreciation to the KU Leuven Department Elektrotechniek- ESAT/COSIC team led by Bart Preneel, and Sebastiaan Indesteege for their outstanding support to the First SHA-3 Candidate Conference. The authors of this report also thank NIST’s Hirofumi Sakane and Caroline Scace for their support in conducting power analysis of the finalists. Last but not least, the authors thank the other members of NIST’s SHA-3 team, who reviewed the candidate algorithms and the public comments, performed testing, provided technical input and administrative support, and participated in numerous meetings during the five-year competition. They are: Elaine B. Barker, Sara J. Caswell, Donghoon Chang, Lily Chen, Quynh Dang, Morris J. Dworkin, James R. Nechvatal, Rene Peralta, William T. Polk, and Andrew Regenscheid. iv TABLE OF CONTENTS 1. Introduction ...................................................................................................................... 1 1.1 Purpose of this Document......................................................................................... 1 1.2 Background .............................................................................................................. 1 1.3 Organization of this Document .................................................................................. 3 2. Evaluation Criteria ............................................................................................................ 4 2.1 Security .................................................................................................................... 4 2.2 Cost and Performance .............................................................................................. 4 2.3 Algorithm and Implementation Characteristics .......................................................... 4 3. Selection Process ............................................................................................................. 5 3.1 Security .................................................................................................................... 5 3.2 Performance ............................................................................................................. 6 3.3 Other Algorithm and Implementation Characteristics ................................................ 6 3.4 Complementing SHA-2 ............................................................................................. 7 3.5 Selection Conclusion ................................................................................................ 7 4. Security Analysis of the Finalists .................................................................................... 9 4.1 Security Overview ..................................................................................................... 9 4.1.1 Overview of Security Resources .................................................................. 10 4.1.2 Domain Extenders and Proofs ..................................................................... 10 4.1.3 Cryptanalysis and Security Margin .............................................................. 12 4.1.4 Distinguishing Attacks and Differential Properties ........................................ 15 4.1.5 Depth of Analysis and Understandability of Algorithms ................................ 16 4.1.6 Tweak History of the Finalists ...................................................................... 16 4.1.7 Side Channel Attacks and Countermeasures .............................................. 18 4.2 Finalist Profiles and Cryptanalysis .......................................................................... 19 4.2.1 BLAKE ........................................................................................................ 20 4.2.2 Grøstl .......................................................................................................... 23 4.2.3 JH................................................................................................................ 26 4.2.4 Keccak ........................................................................................................ 28 4.2.5 Skein ........................................................................................................... 31 4.3 Security Summary .................................................................................................. 33 5. Performance Comparison of the SHA-3 Finalists ........................................................ 35 5.1 Software Performance ............................................................................................ 35 5.1.1 Computer Systems – the Current Playing Field ........................................... 35 5.1.2 Candidate Software Performance Studies ................................................... 36 5.1.3 Beyond The Superscalar ............................................................................. 42 5.1.4 Software Performance Summary ................................................................. 45 5.2 Hardware Performance ........................................................................................... 46 5.2.1 High-Performance Implementations ............................................................ 48 5.2.2 Compact Implementations ........................................................................... 52 5.2.3 Discussion of SHA-2 and the SHA-3 Finalists ............................................. 55 5.2.4 Hardware Performance Summary ............................................................... 57 6. Other Considerations ..................................................................................................... 58 v 6.1 Intellectual Property ................................................................................................ 58 6.2 Other Features ....................................................................................................... 58 7. Conclusion