Knowledge (XXG)

SANDstorm hash

Source 📝

1352: 1332: 1162: 1015: 935: 323: 352: 149: 1385: 1380: 148:
Torgerson, Mark; Schroeppel, Richard; Draelos, Tim; Dautenhahn, Nathan; Malone, Sean; Walker, Andrea; Collins, Michael; Orman, Hilarie.
94:
The SANDstorm hash was accepted into the first round of the NIST hash function competition, but was not accepted into the second round.
879: 712: 1008: 316: 33:
Mark Torgerson, Richard Schroeppel, Tim Draelos, Nathan Dautenhahn, Sean Malone, Andrea Walker, Michael Collins, Hilarie Orman,
1211: 920: 405: 357: 707: 1001: 925: 1327: 1282: 1095: 694: 336: 332: 80: 51: 1206: 309: 1322: 951: 590: 1312: 1302: 1157: 930: 766: 465: 460: 160: 1307: 1297: 1100: 1060: 1053: 1043: 1038: 853: 673: 283: 288: 1048: 961: 347: 238: 88: 87:, Tim Draelos, Nathan Dautenhahn, Sean Malone, Andrea Walker, Michael Collins, and Hilarie Orman for the 1355: 1201: 1147: 976: 626: 580: 470: 428: 413: 395: 254: 1317: 1241: 646: 550: 500: 475: 107: 1080: 971: 848: 797: 736: 555: 515: 495: 1186: 1170: 1117: 905: 889: 838: 423: 84: 1246: 1236: 1107: 782: 242: 186: 1181: 869: 823: 585: 121: 884: 833: 828: 616: 267: 129: 125: 237:
Torgerson, Mark Dolan; Draelos, Timothy John; Schroeppel, Richard Crabtree (2009-09-01).
1256: 1176: 1137: 1085: 1070: 874: 602: 1374: 1337: 1292: 1251: 1231: 1127: 1090: 1065: 966: 843: 545: 62: 1287: 1132: 1122: 1112: 1075: 1024: 219: 1266: 956: 802: 731: 727: 636: 185:
Computer Security Division, Information Technology Laboratory (4 January 2017).
1226: 1196: 1191: 1152: 1216: 631: 106:. The hash function can be parallelized on a large range of platforms using 418: 102:
The hash function has an explicit key schedule. It uses an 8-bit by 8-bit
1261: 1221: 910: 807: 792: 787: 777: 741: 661: 575: 455: 746: 702: 480: 113:
Both SANDstorm-256 and SANDstorm-512 run more than twice as slowly as
1142: 915: 656: 651: 621: 611: 570: 565: 560: 540: 535: 510: 505: 490: 450: 246: 641: 530: 485: 433: 390: 385: 379: 114: 103: 756: 751: 722: 717: 681: 997: 305: 525: 520: 373: 218:
Fleischmann, Ewan; Forler, Christian; Gorski, Michael (2009).
128:
against SANDstorm is known which is better than the trivial
1163:
Cryptographically secure pseudorandom number generator
293: 1275: 1031: 944: 898: 862: 816: 765: 693: 670: 599: 443: 404: 366: 60: 50: 45: 37: 29: 24: 187:"SHA-3 Project - Hash Functions | CSRC | CSRC" 1009: 317: 239:"Parallelism of the SANDstorm hash algorithm" 8: 19: 1016: 1002: 994: 324: 310: 302: 298: 294: 220:"Classification of the SHA-3 Candidates" 140: 263: 252: 18: 7: 213: 211: 209: 207: 83:designed in 2008 by Mark Torgerson, 14: 284:SANDstorm Algorithm Specification 1351: 1350: 132:or long second preimage attack. 1386:NIST hash function competition 1212:Information-theoretic security 921:NIST hash function competition 1: 1381:Cryptographic hash functions 926:Password Hashing Competition 337:message authentication codes 333:Cryptographic hash functions 289:SANDStorm Submission Package 1328:Message authentication code 1283:Cryptographic hash function 1096:Cryptographic hash function 880:Merkle–DamgĂ„rd construction 81:cryptographic hash function 16:Cryptographic hash function 1402: 1207:Harvest now, decrypt later 1346: 1323:Post-quantum cryptography 993: 343: 301: 297: 68: 1313:Quantum key distribution 1303:Authenticated encryption 1158:Random number generation 674:key derivation functions 1308:Public-key cryptography 1298:Symmetric-key algorithm 1101:Key derivation function 1061:Cryptographic primitive 1054:Authentication protocol 1044:Outline of cryptography 1039:History of cryptography 952:Hash-based cryptography 854:Length extension attack 1049:Cryptographic protocol 962:Message authentication 262:Cite journal requires 89:NIST SHA-3 competition 1202:End-to-end encryption 1148:Cryptojacking malware 108:multi-core processing 1318:Quantum cryptography 1242:Trusted timestamping 150:"The SANDstorm Hash" 117:as measured by cpb. 1081:Cryptographic nonce 849:Side-channel attack 21: 1187:Subliminal channel 1171:Pseudorandom noise 1118:Key (cryptography) 906:CAESAR Competition 890:HAIFA construction 839:Brute-force attack 85:Richard Schroeppel 56:224, 256, 384, 512 1368: 1367: 1364: 1363: 1247:Key-based routing 1237:Trapdoor function 1108:Digital signature 989: 988: 985: 984: 783:ChaCha20-Poly1305 600:Password hashing/ 73: 72: 1393: 1354: 1353: 1182:Insecure channel 1018: 1011: 1004: 995: 870:Avalanche effect 824:Collision attack 367:Common functions 326: 319: 312: 303: 299: 295: 272: 271: 265: 260: 258: 250: 234: 228: 227: 215: 202: 201: 199: 197: 182: 176: 175: 173: 171: 165: 159:. Archived from 154: 145: 122:collision attack 22: 1401: 1400: 1396: 1395: 1394: 1392: 1391: 1390: 1371: 1370: 1369: 1360: 1342: 1271: 1027: 1022: 981: 940: 899:Standardization 894: 885:Sponge function 858: 834:Birthday attack 829:Preimage attack 812: 768: 761: 689: 672: 671:General purpose 666: 601: 595: 444:Other functions 439: 406:SHA-3 finalists 400: 362: 339: 330: 280: 275: 261: 251: 236: 235: 231: 217: 216: 205: 195: 193: 184: 183: 179: 169: 167: 163: 152: 147: 146: 142: 138: 130:birthday attack 126:preimage attack 120:As of 2009, no 100: 38:First published 17: 12: 11: 5: 1399: 1397: 1389: 1388: 1383: 1373: 1372: 1366: 1365: 1362: 1361: 1359: 1358: 1347: 1344: 1343: 1341: 1340: 1335: 1333:Random numbers 1330: 1325: 1320: 1315: 1310: 1305: 1300: 1295: 1290: 1285: 1279: 1277: 1273: 1272: 1270: 1269: 1264: 1259: 1257:Garlic routing 1254: 1249: 1244: 1239: 1234: 1229: 1224: 1219: 1214: 1209: 1204: 1199: 1194: 1189: 1184: 1179: 1177:Secure channel 1174: 1168: 1167: 1166: 1155: 1150: 1145: 1140: 1138:Key stretching 1135: 1130: 1125: 1120: 1115: 1110: 1105: 1104: 1103: 1098: 1088: 1086:Cryptovirology 1083: 1078: 1073: 1071:Cryptocurrency 1068: 1063: 1058: 1057: 1056: 1046: 1041: 1035: 1033: 1029: 1028: 1023: 1021: 1020: 1013: 1006: 998: 991: 990: 987: 986: 983: 982: 980: 979: 974: 969: 964: 959: 954: 948: 946: 942: 941: 939: 938: 933: 928: 923: 918: 913: 908: 902: 900: 896: 895: 893: 892: 887: 882: 877: 875:Hash collision 872: 866: 864: 860: 859: 857: 856: 851: 846: 841: 836: 831: 826: 820: 818: 814: 813: 811: 810: 805: 800: 795: 790: 785: 780: 774: 772: 763: 762: 760: 759: 754: 749: 744: 739: 734: 725: 720: 715: 710: 705: 699: 697: 691: 690: 688: 687: 684: 678: 676: 668: 667: 665: 664: 659: 654: 649: 644: 639: 634: 629: 624: 619: 614: 608: 606: 603:key stretching 597: 596: 594: 593: 588: 583: 578: 573: 568: 563: 558: 553: 548: 543: 538: 533: 528: 523: 518: 513: 508: 503: 498: 493: 488: 483: 478: 473: 468: 463: 458: 453: 447: 445: 441: 440: 438: 437: 431: 426: 421: 416: 410: 408: 402: 401: 399: 398: 393: 388: 383: 377: 370: 368: 364: 363: 361: 360: 355: 350: 344: 341: 340: 331: 329: 328: 321: 314: 306: 292: 291: 286: 279: 278:External links 276: 274: 273: 264:|journal= 229: 224:Drops-Idn/1948 203: 177: 166:on 12 May 2009 157:www.sandia.gov 139: 137: 134: 99: 96: 77:SANDstorm hash 71: 70: 66: 65: 58: 57: 54: 48: 47: 43: 42: 39: 35: 34: 31: 27: 26: 15: 13: 10: 9: 6: 4: 3: 2: 1398: 1387: 1384: 1382: 1379: 1378: 1376: 1357: 1349: 1348: 1345: 1339: 1338:Steganography 1336: 1334: 1331: 1329: 1326: 1324: 1321: 1319: 1316: 1314: 1311: 1309: 1306: 1304: 1301: 1299: 1296: 1294: 1293:Stream cipher 1291: 1289: 1286: 1284: 1281: 1280: 1278: 1274: 1268: 1265: 1263: 1260: 1258: 1255: 1253: 1252:Onion routing 1250: 1248: 1245: 1243: 1240: 1238: 1235: 1233: 1232:Shared secret 1230: 1228: 1225: 1223: 1220: 1218: 1215: 1213: 1210: 1208: 1205: 1203: 1200: 1198: 1195: 1193: 1190: 1188: 1185: 1183: 1180: 1178: 1175: 1172: 1169: 1164: 1161: 1160: 1159: 1156: 1154: 1151: 1149: 1146: 1144: 1141: 1139: 1136: 1134: 1131: 1129: 1128:Key generator 1126: 1124: 1121: 1119: 1116: 1114: 1111: 1109: 1106: 1102: 1099: 1097: 1094: 1093: 1092: 1091:Hash function 1089: 1087: 1084: 1082: 1079: 1077: 1074: 1072: 1069: 1067: 1066:Cryptanalysis 1064: 1062: 1059: 1055: 1052: 1051: 1050: 1047: 1045: 1042: 1040: 1037: 1036: 1034: 1030: 1026: 1019: 1014: 1012: 1007: 1005: 1000: 999: 996: 992: 978: 975: 973: 970: 968: 967:Proof of work 965: 963: 960: 958: 955: 953: 950: 949: 947: 943: 937: 934: 932: 929: 927: 924: 922: 919: 917: 914: 912: 909: 907: 904: 903: 901: 897: 891: 888: 886: 883: 881: 878: 876: 873: 871: 868: 867: 865: 861: 855: 852: 850: 847: 845: 844:Rainbow table 842: 840: 837: 835: 832: 830: 827: 825: 822: 821: 819: 815: 809: 806: 804: 801: 799: 796: 794: 791: 789: 786: 784: 781: 779: 776: 775: 773: 770: 767:Authenticated 764: 758: 755: 753: 750: 748: 745: 743: 740: 738: 735: 733: 729: 726: 724: 721: 719: 716: 714: 711: 709: 706: 704: 701: 700: 698: 696: 695:MAC functions 692: 685: 683: 680: 679: 677: 675: 669: 663: 660: 658: 655: 653: 650: 648: 645: 643: 640: 638: 635: 633: 630: 628: 625: 623: 620: 618: 615: 613: 610: 609: 607: 604: 598: 592: 589: 587: 584: 582: 579: 577: 574: 572: 569: 567: 564: 562: 559: 557: 554: 552: 549: 547: 544: 542: 539: 537: 534: 532: 529: 527: 524: 522: 519: 517: 514: 512: 509: 507: 504: 502: 499: 497: 494: 492: 489: 487: 484: 482: 479: 477: 474: 472: 469: 467: 464: 462: 459: 457: 454: 452: 449: 448: 446: 442: 435: 432: 430: 427: 425: 422: 420: 417: 415: 412: 411: 409: 407: 403: 397: 394: 392: 389: 387: 384: 382:(compromised) 381: 378: 376:(compromised) 375: 372: 371: 369: 365: 359: 358:Known attacks 356: 354: 351: 349: 346: 345: 342: 338: 334: 327: 322: 320: 315: 313: 308: 307: 304: 300: 296: 290: 287: 285: 282: 281: 277: 269: 256: 248: 244: 240: 233: 230: 225: 221: 214: 212: 210: 208: 204: 192: 188: 181: 178: 162: 158: 151: 144: 141: 135: 133: 131: 127: 123: 118: 116: 111: 109: 105: 97: 95: 92: 90: 86: 82: 78: 67: 64: 63:cryptanalysis 59: 55: 53: 49: 44: 40: 36: 32: 28: 23: 1288:Block cipher 1133:Key schedule 1123:Key exchange 1113:Kleptography 1076:Cryptosystem 1025:Cryptography 255:cite journal 232: 223: 194:. Retrieved 190: 180: 168:. Retrieved 161:the original 156: 143: 119: 112: 101: 98:Architecture 93: 76: 74: 61:Best public 52:Digest sizes 1276:Mathematics 1267:Mix network 957:Merkle tree 945:Utilization 931:NSA Suite B 191:CSRC | NIST 1375:Categories 1227:Ciphertext 1197:Decryption 1192:Encryption 1153:Ransomware 769:encryption 546:RadioGatĂșn 353:Comparison 136:References 1217:Plaintext 686:KDF1/KDF2 605:functions 591:Whirlpool 30:Designers 20:SANDstorm 1356:Category 1262:Kademlia 1222:Codetext 1165:(CSPRNG) 911:CRYPTREC 742:Poly1305 662:yescrypt 576:Streebog 456:CubeHash 436:(winner) 1032:General 817:Attacks 747:SipHash 703:CBC-MAC 637:LM hash 617:Balloon 481:HAS-160 196:20 July 170:20 July 25:General 1143:Keygen 977:Pepper 916:NESSIE 863:Design 657:scrypt 652:PBKDF2 627:Catena 622:bcrypt 612:Argon2 571:Snefru 566:Shabal 561:SWIFFT 541:RIPEMD 536:N-hash 511:MASH-2 506:MASH-1 491:Kupyna 451:BLAKE3 434:Keccak 419:GrĂžstl 396:BLAKE2 247:993877 245:  46:Detail 1173:(PRN) 771:modes 647:Makwa 642:Lyra2 632:crypt 581:Tiger 531:MDC-2 486:HAVAL 471:Fugue 429:Skein 414:BLAKE 391:SHA-3 386:SHA-2 380:SHA-1 164:(PDF) 153:(PDF) 115:SHA-2 104:S-box 79:is a 972:Salt 936:CNSA 803:IAPM 757:VMAC 752:UMAC 737:PMAC 732:CMAC 728:OMAC 723:NMAC 718:HMAC 713:GMAC 682:HKDF 551:SIMD 501:Lane 476:GOST 461:ECOH 348:List 335:and 268:help 243:OSTI 198:2021 172:2021 75:The 69:None 41:2008 808:OCB 798:GCM 793:EAX 788:CWC 778:CCM 708:DAA 586:VSH 556:SM3 526:MD6 521:MD4 516:MD2 496:LSH 466:FSB 374:MD5 124:or 1377:: 424:JH 259:: 257:}} 253:{{ 241:. 222:. 206:^ 189:. 155:. 110:. 91:. 1017:e 1010:t 1003:v 730:/ 325:e 318:t 311:v 270:) 266:( 249:. 226:. 200:. 174:.

Index

Digest sizes
cryptanalysis
cryptographic hash function
Richard Schroeppel
NIST SHA-3 competition
S-box
multi-core processing
SHA-2
collision attack
preimage attack
birthday attack
"The SANDstorm Hash"
the original
"SHA-3 Project - Hash Functions | CSRC | CSRC"




"Classification of the SHA-3 Candidates"
"Parallelism of the SANDstorm hash algorithm"
OSTI
993877
cite journal
help
SANDstorm Algorithm Specification
SANDStorm Submission Package
v
t
e
Cryptographic hash functions

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑