sha-3

Does the security of Skein as a hash imply the security of Threefish as a block cipher?

The Skein hash proposed for SHA-3 boasts some impressive speed results, which I suspect would be applicable for the Threefish block cipher at its heart - but, if Skein is approved for SHA-3, would this imply that Threefish is considered secure as well? That is, would any vulnerability in Threefish imply a vulnerability in SHA-3? (and thu...

Password hashing, salt and storage of hashed values

Suppose you were at liberty to decide how hashed passwords were to be stored in a DBMS. Are there obvious weaknesses in a scheme like this one? To create the hash value stored in the DBMS, take: A value that is unique to the DBMS server instance as part of the salt, And the username as a second part of the salt, And create the concat...

Using Skein for File integrity checking.

Hi Id like to know that is it possible to use skein instead of MD5 or SHA1 for file integrity checking? How? Is that really better or faster than SHA1 and MD5?Explain please. ...

any SHA-3 news?

The NIST 2nd SHA-3 Candidate Conference was held in late August. Has there been any news on the SHA-3 competition entrants that came to light at the conference? ...