Cryptographers chosen for NIST contest

A competition to find a replacement for one of the gold-standard computer security algorithms used in almost all secure, online transactions just heated up.

The government looked for, and found, a few good algorithms. Specifically, the National Institute of Standards and Technology is about to conclude a competition for a new way to secure online transactions. The current encryption algorithm was considered safe, until a Chinese computer expert exposed weaknesses back in 2005. That algorithm, known as SHA-1, is still in use. Its cousin, SHA-2, has some of the same weaknesses. New Scientist.com reports, NIST received 64 entries. It narrowed them down to five finalists. Now the agency will pit those five against crypo-analysts, who will attempt to break the algorithms. The winner will be selected in 2012. That new standard will be known as, you guessed it, SHA-3.

This story is part of Federal News Radio’s daily Cybersecurity Update brought to you by Tripwire. For more cybersecurity news, click here.

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

    Amelia Brust/Federal News NetworkVeterans Affairs

    House to vote on bill to make it easier to fire VA employees accused of misconduct

    Read more
    AP Photo/Paul Sancya, FileFILE - In this July 20, 2018, file photo a copper water supply line, left, is shown connected to a water main after being installed for lead pipe, right, in Flint, Mich. The Trump administration overhauled the country's widely criticized, 29-year-old framework to eliminate toxic lead from drinking water on Tuesday, but critics charge that the new rule gives utilities far more time than before to finally replace old, lead-contaminated pipes. (AP Photo/Paul Sancya, File)

    The EPA flubs a survey and misallocates hundreds of millions of dollars

    Read more