"Bullrun" auf SHA-3?
The cryptographic community has been deeply shaken since revelations earlier this month that the National Security Agency (NSA) has been
using a number of underhanded methods – stealing encryption keys, subverting standards setting processes, planting backdoors in products
– to undermine much of the encryption used online.
(...)
Those of us who follow developments in the cryptographic community have noticed another troubling development: there are a number of
cryptographers upset with how the National Institute of Standards and Technology (NIST) is standardizing a new set of encryption algorithms
called SHA-3 (which stands for the third version of the Secure Hashing Algorithm).
using a number of underhanded methods – stealing encryption keys, subverting standards setting processes, planting backdoors in products
– to undermine much of the encryption used online.
(...)
Those of us who follow developments in the cryptographic community have noticed another troubling development: there are a number of
cryptographers upset with how the National Institute of Standards and Technology (NIST) is standardizing a new set of encryption algorithms
called SHA-3 (which stands for the third version of the Secure Hashing Algorithm).
Was das NIST als SHA-3 standardisiert, ist wohl eine grobe Verunstaltung des ursprünglich eingereichten Algorithmus'.
(Dank an AP/DV//HT für den Linktipp)
https://www.cdt.org/blogs/joseph-lorenzo-hall/2409-nist-sha-3
Bitte markiere auch die Kommentare, die zur Lösung des Beitrags beigetragen haben
Content-ID: 218386
Url: https://administrator.de/forum/bullrun-auf-sha-3-218386.html
Ausgedruckt am: 17.05.2025 um 22:05 Uhr