Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
New online security code to be tested
by Staff Writers
Gaithersburg, Md. (UPI) Dec 13, 2010


disclaimer: image is for illustration purposes only

A competition is on to find a replacement for a computer security algorithm used in almost all secure online transactions, U.S. officials said.

The U.S. National Institute of Standards and Technology in Gaithersburg, Md., will pit the five finalists for the code to become Secure Hash Algorithm-3, or SHA-3, against cryptanalysts who will do their best to crack them, NewScientist.com reported Monday.

After an international community of cryptanalysts test and analyze the algorithms for weaknesses, one will be selected as the winner in 2012.

The need for the competition dates to 2004 and 2005 when Chinese cryptanalyst Xiaoyun Wang shocked security experts by revealing flaws in the current algorithm SHA-1, the gold-standard relied upon for almost all online banking transactions, digital signatures, and the secure storage of some passwords for e-mail accounts and other online activities.

A less-widely used SHA-2 algorithm is similar and shares the same vulnerabilities.

Hash algorithms scramble computer files into a fixed-length string of bits called a hash.

Under SHA-1, it was thought the only way to unscramble a hash would require millions of years' worth of computing power, but Wang found a shortcut, raising the possibility that online transactions could someday be rendered insecure.

NIST launched the competition to find a replacement in 2007.

NIST received 64 entries, pruned to a list of 14 that warranted further consideration, and then on Dec. 9 NIST announced it had settled on just five finalists.

"We picked five finalists that seemed to have the best combination of confidence in the security of the algorithm and their performance on a wide range of platforms" such as desktop computers and servers, William Burr of NIST said.

The competition is a big deal for cryptographers and cryptanalysts alike, Burr said.

"These are incredibly competitive people. They just love this," Burr said of the cryptanalysts who will test the new algorithms. "It's almost too much fun. For us, it's a lot of work."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
No apparent Stuxnet impact in US: cyber official
Washington (AFP) Dec 7, 2010
Computer software targeted by Stuxnet is used in US infrastructure but the virus does not appear to have affected any systems in the United States, a US cybersecurity official said Tuesday. Greg Schaffer, assistant secretary for cybersecurity and communications in the Department of Homeland Security (DHS), told reporters here that Stuxnet demonstrates the increasingly sophisticated nature of ... read more


CYBER WARS
Robotic Excavations Could Help Get Helium 3 From Moon To Earth

A Softer Landing on the Moon

Neptec Wins Canadian Space Agency Contract To Develop A New Generation Of Lunar Rovers

Mission to far side of moon proposed

CYBER WARS
Wind And Water Have Shaped Schiaparelli On Mars

The Three Ages Of Mars

Odyssey Orbiter Nears Martian Longevity Record

Drilling For The Future Of Science

CYBER WARS
Iran Plans To Build Second Spaceport

Boeing Submits Proposal For Second Round Of NASA CCDev Program

NASA Names Waleed Abdalati As Agency's New Chief Scientist

Discovery Of The Secrets That Enable Plants Near Chernobyl To Shrug Off Radiation

CYBER WARS
China Builds Theme Park In Spaceport

Tiangong Space Station Plans Progessing

China-Made Satellite Keeps Remote Areas In Venezuela Connected

Optis Software To Optimize Chinese Satellite Design

CYBER WARS
ISS Tracks Months-Long Voyages Of Ships At Sea

Busy Day For ISS Commander

NASA Seeks Nonprofit To Manage ISS National Lab Research

Expedition 25 Returns Home

CYBER WARS
The Flight Of The Dragon

SpaceX Dragon Does Two Orbits Before Pacific Splashdown

NASA, SpaceX giddy over historic orbit launch

ISRO Hands Two Contracts To Arianespace

CYBER WARS
New Pictures Show Fourth Planet In Giant Version Of Our Solar System

Carbon-Rich Planet: A Girl's Best Friend

NASA Scientists Theorize Final Growth Spurt For Planets

Astronomers Detect First Carbon-Rich Exoplanet

CYBER WARS
ThumbDrive inventor out to prove he is no one-hit wonder

Space Sensor Makes Bolts Smarter

Capasso Lab Demonstrates Highly Unidirectional Whispering Gallery Microlasers

Taiwan to approve three billion dollar China plant: report




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement