News and Updates
Research Results on SHA-1 Collisions
February 24, 2017
On Thursday, February 23rd, Google announced that a team of researchers from the CWI Institute in Amsterdam and Google have successfully demonstrated an attack on the SHA-1 hash algorithm by creating two files that hash to...
NIST Announces the Release of NISTIR 7896
November 16, 2012
NIST opened a public "SHA-3" competition in November 2007 to develop a new cryptographic hash algorithm. On October 2, 2012, NIST announced Keccak as the winner and the new SHA-3 algorithm.
NIST and NISTs CSD Announced the SHA-3 WINNER
October 3, 2012
NIST announced KECCAK as the winner of the SHA-3 Cryptographic Hash Algorithm Competition and the new SHA-3 hash algorithm in a press release issued on October 2, 2012. KECCAK was designed by a team ...
Request for Candidate Algorithm Nominations
November 2, 2007
This notice solicits nominations from any interested party for candidate algorithms to be considered for SHA-3, and specifies how to submit a nomination package.
NIST Comments on Cryptanalytic Attacks on SHA-1
April 26, 2006
In 2005 Prof. Xiaoyun Wang announced a differential attack on the SHA-1 hash function. NIST found that the attack was practical, and announced plans for transitioning to SHA-2 algorithms and development of SHA-3.
NIST Brief Comments on Recent Cryptanalytic Attacks
August 25, 2004
Researchers have recently announced they have discovered a new way to break a number of cryptographic hash algorithms. Click here to read NIST's brief comments on recent cryptanalytic attacks on secure hashing functions and...
Created January 04, 2017, Updated June 22, 2020