Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Encryption Security Software News

New SHA Functions Boost Crypto On 64-bit Chips 60

An anonymous reader writes "The National Institute of Standards and Technology, guardian of America's cryptography standards, has announced a new extension to the SHA-2 hashing algorithm family that promises to boost performance on modern chips. Announced this week, two new standards — SHA-512/224 and SHA-512/256 — have been created to directly replace the SHA-224 and SHA-256 standards. They take advantage of the speed improvements inherent in SHA-512 on 64-bit processors to produce checksums more rapidly than their predecessors — but truncate them at a shorter length, reducing the overall timespan and complexity of the digest." Further details are available from NIST (PDF).
This discussion has been archived. No new comments can be posted.

New SHA Functions Boost Crypto On 64-bit Chips

Comments Filter:
  • Re:faster?? (Score:1, Informative)

    by sexconker ( 1179573 ) on Friday February 18, 2011 @06:39PM (#35249432)

    Wasn't there an article recently complaining that the speed of SHA made it relativly useless as a hashing algorithm to protrect passwords? Surely the increase in speed would have a greater effect on cracking speed than on the speed of legitimite authentication.

    Yes and no.

    Yes there was such an article.
    No it doesn't mean shit - that's what salts and multiple rounds of an algorithm are for.

    But then again, yes this is bad news bears because nobody can seem to keep their password file out of reach of hackers, nobody can seem to figure out why and how they should use a salt, and no one ever configures their crypto to do anything but the bog standard shit. This is a result of idiots mindlessly screaming "Don't roll your own crypto!!!!" and forgetting that the last word of that sentence is supposed to be "algorithm". You absolutely should have a non-standard crypto routine using a standard algorithm. This isn't security through obscurity, it's security though making script kiddies' rainbow tables useless.

  • Re:faster?? (Score:4, Informative)

    by petermgreen ( 876956 ) <plugwash.p10link@net> on Friday February 18, 2011 @07:00PM (#35249606) Homepage

    IIRC the CRC hashes are only designed to protect against accidental changes while secure hashes are designed to protect against both accidental and malicious changes. This makes them more suited to distributed systems where not every participant is trustworthy.

  • CRC has its limits. (Score:4, Informative)

    by jhantin ( 252660 ) on Friday February 18, 2011 @07:04PM (#35249638)

    Different hashes are for different purposes.

    No argument there.

    The CRC class of hash functions actually makes certain statistical guarantees for the longest run of possible errant bytes in source data and are extremely faster, making them far more suitable for file integrity checks.

    CRC is great for packet-sized input, but not so great over larger chunks of data; also, the way its design targets burst errors means that widely separated point errors aren't as effectively caught. There's a reason Ethernet jumbo frames haven't gone much over 9000 bytes -- Ethernet's CRC-32 is much less effective at message sizes over 12000 bytes [wareonearth.com] or so. Cryptographically strong hashes tend to be less sensitive to input length.

  • Link to the standard (Score:4, Informative)

    by owlstead ( 636356 ) on Friday February 18, 2011 @08:47PM (#35250522)

    If anyone is interested in the source material, here it is:

    http://csrc.nist.gov/publications/drafts/fips180-4/Draft-FIPS180-4_Feb2011.pdf [nist.gov]

    Fresh from the press, it seems.

    By the way, the SHA-512/224, SHA-512/256, SHA-384 and SHA-512 are only different in their initial hash value, so it is very easy to implement these algorithms. Just change the constant and cut the required number of output bits. Personally, I think it is at least two hash functions too many.

"God is a comedian playing to an audience too afraid to laugh." - Voltaire

Working...