1352:
1332:
1162:
1015:
935:
323:
352:
149:
1385:
1380:
148:
Torgerson, Mark; Schroeppel, Richard; Draelos, Tim; Dautenhahn, Nathan; Malone, Sean; Walker, Andrea; Collins, Michael; Orman, Hilarie.
94:
The SANDstorm hash was accepted into the first round of the NIST hash function competition, but was not accepted into the second round.
879:
712:
1008:
316:
33:
Mark
Torgerson, Richard Schroeppel, Tim Draelos, Nathan Dautenhahn, Sean Malone, Andrea Walker, Michael Collins, Hilarie Orman,
1211:
920:
405:
357:
707:
1001:
925:
1327:
1282:
1095:
694:
336:
332:
80:
51:
1206:
309:
1322:
951:
590:
1312:
1302:
1157:
930:
766:
465:
460:
160:
1307:
1297:
1100:
1060:
1053:
1043:
1038:
853:
673:
283:
288:
1048:
961:
347:
238:
88:
87:, Tim Draelos, Nathan Dautenhahn, Sean Malone, Andrea Walker, Michael Collins, and Hilarie Orman for the
1355:
1201:
1147:
976:
626:
580:
470:
428:
413:
395:
254:
1317:
1241:
646:
550:
500:
475:
107:
1080:
971:
848:
797:
736:
555:
515:
495:
1186:
1170:
1117:
905:
889:
838:
423:
84:
1246:
1236:
1107:
782:
242:
186:
1181:
869:
823:
585:
121:
884:
833:
828:
616:
267:
129:
125:
237:
Torgerson, Mark Dolan; Draelos, Timothy John; Schroeppel, Richard
Crabtree (2009-09-01).
1256:
1176:
1137:
1085:
1070:
874:
602:
1374:
1337:
1292:
1251:
1231:
1127:
1090:
1065:
966:
843:
545:
62:
1287:
1132:
1122:
1112:
1075:
1024:
219:
1266:
956:
802:
731:
727:
636:
185:
Computer
Security Division, Information Technology Laboratory (4 January 2017).
1226:
1196:
1191:
1152:
1216:
631:
106:. The hash function can be parallelized on a large range of platforms using
418:
102:
The hash function has an explicit key schedule. It uses an 8-bit by 8-bit
1261:
1221:
910:
807:
792:
787:
777:
741:
661:
575:
455:
746:
702:
480:
113:
Both SANDstorm-256 and SANDstorm-512 run more than twice as slowly as
1142:
915:
656:
651:
621:
611:
570:
565:
560:
540:
535:
510:
505:
490:
450:
246:
641:
530:
485:
433:
390:
385:
379:
114:
103:
756:
751:
722:
717:
681:
997:
305:
525:
520:
373:
218:
Fleischmann, Ewan; Forler, Christian; Gorski, Michael (2009).
128:
against SANDstorm is known which is better than the trivial
1163:
Cryptographically secure pseudorandom number generator
293:
1275:
1031:
944:
898:
862:
816:
765:
693:
670:
599:
443:
404:
366:
60:
50:
45:
37:
29:
24:
187:"SHA-3 Project - Hash Functions | CSRC | CSRC"
1009:
317:
239:"Parallelism of the SANDstorm hash algorithm"
8:
19:
1016:
1002:
994:
324:
310:
302:
298:
294:
220:"Classification of the SHA-3 Candidates"
140:
263:
252:
18:
7:
213:
211:
209:
207:
83:designed in 2008 by Mark Torgerson,
14:
284:SANDstorm Algorithm Specification
1351:
1350:
132:or long second preimage attack.
1386:NIST hash function competition
1212:Information-theoretic security
921:NIST hash function competition
1:
1381:Cryptographic hash functions
926:Password Hashing Competition
337:message authentication codes
333:Cryptographic hash functions
289:SANDStorm Submission Package
1328:Message authentication code
1283:Cryptographic hash function
1096:Cryptographic hash function
880:MerkleâDamgĂ„rd construction
81:cryptographic hash function
16:Cryptographic hash function
1402:
1207:Harvest now, decrypt later
1346:
1323:Post-quantum cryptography
993:
343:
301:
297:
68:
1313:Quantum key distribution
1303:Authenticated encryption
1158:Random number generation
674:key derivation functions
1308:Public-key cryptography
1298:Symmetric-key algorithm
1101:Key derivation function
1061:Cryptographic primitive
1054:Authentication protocol
1044:Outline of cryptography
1039:History of cryptography
952:Hash-based cryptography
854:Length extension attack
1049:Cryptographic protocol
962:Message authentication
262:Cite journal requires
89:NIST SHA-3 competition
1202:End-to-end encryption
1148:Cryptojacking malware
108:multi-core processing
1318:Quantum cryptography
1242:Trusted timestamping
150:"The SANDstorm Hash"
117:as measured by cpb.
1081:Cryptographic nonce
849:Side-channel attack
21:
1187:Subliminal channel
1171:Pseudorandom noise
1118:Key (cryptography)
906:CAESAR Competition
890:HAIFA construction
839:Brute-force attack
85:Richard Schroeppel
56:224, 256, 384, 512
1368:
1367:
1364:
1363:
1247:Key-based routing
1237:Trapdoor function
1108:Digital signature
989:
988:
985:
984:
783:ChaCha20-Poly1305
600:Password hashing/
73:
72:
1393:
1354:
1353:
1182:Insecure channel
1018:
1011:
1004:
995:
870:Avalanche effect
824:Collision attack
367:Common functions
326:
319:
312:
303:
299:
295:
272:
271:
265:
260:
258:
250:
234:
228:
227:
215:
202:
201:
199:
197:
182:
176:
175:
173:
171:
165:
159:. Archived from
154:
145:
122:collision attack
22:
1401:
1400:
1396:
1395:
1394:
1392:
1391:
1390:
1371:
1370:
1369:
1360:
1342:
1271:
1027:
1022:
981:
940:
899:Standardization
894:
885:Sponge function
858:
834:Birthday attack
829:Preimage attack
812:
768:
761:
689:
672:
671:General purpose
666:
601:
595:
444:Other functions
439:
406:SHA-3 finalists
400:
362:
339:
330:
280:
275:
261:
251:
236:
235:
231:
217:
216:
205:
195:
193:
184:
183:
179:
169:
167:
163:
152:
147:
146:
142:
138:
130:birthday attack
126:preimage attack
120:As of 2009, no
100:
38:First published
17:
12:
11:
5:
1399:
1397:
1389:
1388:
1383:
1373:
1372:
1366:
1365:
1362:
1361:
1359:
1358:
1347:
1344:
1343:
1341:
1340:
1335:
1333:Random numbers
1330:
1325:
1320:
1315:
1310:
1305:
1300:
1295:
1290:
1285:
1279:
1277:
1273:
1272:
1270:
1269:
1264:
1259:
1257:Garlic routing
1254:
1249:
1244:
1239:
1234:
1229:
1224:
1219:
1214:
1209:
1204:
1199:
1194:
1189:
1184:
1179:
1177:Secure channel
1174:
1168:
1167:
1166:
1155:
1150:
1145:
1140:
1138:Key stretching
1135:
1130:
1125:
1120:
1115:
1110:
1105:
1104:
1103:
1098:
1088:
1086:Cryptovirology
1083:
1078:
1073:
1071:Cryptocurrency
1068:
1063:
1058:
1057:
1056:
1046:
1041:
1035:
1033:
1029:
1028:
1023:
1021:
1020:
1013:
1006:
998:
991:
990:
987:
986:
983:
982:
980:
979:
974:
969:
964:
959:
954:
948:
946:
942:
941:
939:
938:
933:
928:
923:
918:
913:
908:
902:
900:
896:
895:
893:
892:
887:
882:
877:
875:Hash collision
872:
866:
864:
860:
859:
857:
856:
851:
846:
841:
836:
831:
826:
820:
818:
814:
813:
811:
810:
805:
800:
795:
790:
785:
780:
774:
772:
763:
762:
760:
759:
754:
749:
744:
739:
734:
725:
720:
715:
710:
705:
699:
697:
691:
690:
688:
687:
684:
678:
676:
668:
667:
665:
664:
659:
654:
649:
644:
639:
634:
629:
624:
619:
614:
608:
606:
603:key stretching
597:
596:
594:
593:
588:
583:
578:
573:
568:
563:
558:
553:
548:
543:
538:
533:
528:
523:
518:
513:
508:
503:
498:
493:
488:
483:
478:
473:
468:
463:
458:
453:
447:
445:
441:
440:
438:
437:
431:
426:
421:
416:
410:
408:
402:
401:
399:
398:
393:
388:
383:
377:
370:
368:
364:
363:
361:
360:
355:
350:
344:
341:
340:
331:
329:
328:
321:
314:
306:
292:
291:
286:
279:
278:External links
276:
274:
273:
264:|journal=
229:
224:Drops-Idn/1948
203:
177:
166:on 12 May 2009
157:www.sandia.gov
139:
137:
134:
99:
96:
77:SANDstorm hash
71:
70:
66:
65:
58:
57:
54:
48:
47:
43:
42:
39:
35:
34:
31:
27:
26:
15:
13:
10:
9:
6:
4:
3:
2:
1398:
1387:
1384:
1382:
1379:
1378:
1376:
1357:
1349:
1348:
1345:
1339:
1338:Steganography
1336:
1334:
1331:
1329:
1326:
1324:
1321:
1319:
1316:
1314:
1311:
1309:
1306:
1304:
1301:
1299:
1296:
1294:
1293:Stream cipher
1291:
1289:
1286:
1284:
1281:
1280:
1278:
1274:
1268:
1265:
1263:
1260:
1258:
1255:
1253:
1252:Onion routing
1250:
1248:
1245:
1243:
1240:
1238:
1235:
1233:
1232:Shared secret
1230:
1228:
1225:
1223:
1220:
1218:
1215:
1213:
1210:
1208:
1205:
1203:
1200:
1198:
1195:
1193:
1190:
1188:
1185:
1183:
1180:
1178:
1175:
1172:
1169:
1164:
1161:
1160:
1159:
1156:
1154:
1151:
1149:
1146:
1144:
1141:
1139:
1136:
1134:
1131:
1129:
1128:Key generator
1126:
1124:
1121:
1119:
1116:
1114:
1111:
1109:
1106:
1102:
1099:
1097:
1094:
1093:
1092:
1091:Hash function
1089:
1087:
1084:
1082:
1079:
1077:
1074:
1072:
1069:
1067:
1066:Cryptanalysis
1064:
1062:
1059:
1055:
1052:
1051:
1050:
1047:
1045:
1042:
1040:
1037:
1036:
1034:
1030:
1026:
1019:
1014:
1012:
1007:
1005:
1000:
999:
996:
992:
978:
975:
973:
970:
968:
967:Proof of work
965:
963:
960:
958:
955:
953:
950:
949:
947:
943:
937:
934:
932:
929:
927:
924:
922:
919:
917:
914:
912:
909:
907:
904:
903:
901:
897:
891:
888:
886:
883:
881:
878:
876:
873:
871:
868:
867:
865:
861:
855:
852:
850:
847:
845:
844:Rainbow table
842:
840:
837:
835:
832:
830:
827:
825:
822:
821:
819:
815:
809:
806:
804:
801:
799:
796:
794:
791:
789:
786:
784:
781:
779:
776:
775:
773:
770:
767:Authenticated
764:
758:
755:
753:
750:
748:
745:
743:
740:
738:
735:
733:
729:
726:
724:
721:
719:
716:
714:
711:
709:
706:
704:
701:
700:
698:
696:
695:MAC functions
692:
685:
683:
680:
679:
677:
675:
669:
663:
660:
658:
655:
653:
650:
648:
645:
643:
640:
638:
635:
633:
630:
628:
625:
623:
620:
618:
615:
613:
610:
609:
607:
604:
598:
592:
589:
587:
584:
582:
579:
577:
574:
572:
569:
567:
564:
562:
559:
557:
554:
552:
549:
547:
544:
542:
539:
537:
534:
532:
529:
527:
524:
522:
519:
517:
514:
512:
509:
507:
504:
502:
499:
497:
494:
492:
489:
487:
484:
482:
479:
477:
474:
472:
469:
467:
464:
462:
459:
457:
454:
452:
449:
448:
446:
442:
435:
432:
430:
427:
425:
422:
420:
417:
415:
412:
411:
409:
407:
403:
397:
394:
392:
389:
387:
384:
382:(compromised)
381:
378:
376:(compromised)
375:
372:
371:
369:
365:
359:
358:Known attacks
356:
354:
351:
349:
346:
345:
342:
338:
334:
327:
322:
320:
315:
313:
308:
307:
304:
300:
296:
290:
287:
285:
282:
281:
277:
269:
256:
248:
244:
240:
233:
230:
225:
221:
214:
212:
210:
208:
204:
192:
188:
181:
178:
162:
158:
151:
144:
141:
135:
133:
131:
127:
123:
118:
116:
111:
109:
105:
97:
95:
92:
90:
86:
82:
78:
67:
64:
63:cryptanalysis
59:
55:
53:
49:
44:
40:
36:
32:
28:
23:
1288:Block cipher
1133:Key schedule
1123:Key exchange
1113:Kleptography
1076:Cryptosystem
1025:Cryptography
255:cite journal
232:
223:
194:. Retrieved
190:
180:
168:. Retrieved
161:the original
156:
143:
119:
112:
101:
98:Architecture
93:
76:
74:
61:Best public
52:Digest sizes
1276:Mathematics
1267:Mix network
957:Merkle tree
945:Utilization
931:NSA Suite B
191:CSRC | NIST
1375:Categories
1227:Ciphertext
1197:Decryption
1192:Encryption
1153:Ransomware
769:encryption
546:RadioGatĂșn
353:Comparison
136:References
1217:Plaintext
686:KDF1/KDF2
605:functions
591:Whirlpool
30:Designers
20:SANDstorm
1356:Category
1262:Kademlia
1222:Codetext
1165:(CSPRNG)
911:CRYPTREC
742:Poly1305
662:yescrypt
576:Streebog
456:CubeHash
436:(winner)
1032:General
817:Attacks
747:SipHash
703:CBC-MAC
637:LM hash
617:Balloon
481:HAS-160
196:20 July
170:20 July
25:General
1143:Keygen
977:Pepper
916:NESSIE
863:Design
657:scrypt
652:PBKDF2
627:Catena
622:bcrypt
612:Argon2
571:Snefru
566:Shabal
561:SWIFFT
541:RIPEMD
536:N-hash
511:MASH-2
506:MASH-1
491:Kupyna
451:BLAKE3
434:Keccak
419:GrĂžstl
396:BLAKE2
247:993877
245:
46:Detail
1173:(PRN)
771:modes
647:Makwa
642:Lyra2
632:crypt
581:Tiger
531:MDC-2
486:HAVAL
471:Fugue
429:Skein
414:BLAKE
391:SHA-3
386:SHA-2
380:SHA-1
164:(PDF)
153:(PDF)
115:SHA-2
104:S-box
79:is a
972:Salt
936:CNSA
803:IAPM
757:VMAC
752:UMAC
737:PMAC
732:CMAC
728:OMAC
723:NMAC
718:HMAC
713:GMAC
682:HKDF
551:SIMD
501:Lane
476:GOST
461:ECOH
348:List
335:and
268:help
243:OSTI
198:2021
172:2021
75:The
69:None
41:2008
808:OCB
798:GCM
793:EAX
788:CWC
778:CCM
708:DAA
586:VSH
556:SM3
526:MD6
521:MD4
516:MD2
496:LSH
466:FSB
374:MD5
124:or
1377::
424:JH
259::
257:}}
253:{{
241:.
222:.
206:^
189:.
155:.
110:.
91:.
1017:e
1010:t
1003:v
730:/
325:e
318:t
311:v
270:)
266:(
249:.
226:.
200:.
174:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.