This article was first published on IOTA - Medium
Introducing the Troika Hash Function Developed by Expert Cryptographers; €200,000 Cryptanalytic Competition Invites Cryptanalysts Worldwide to Evaluate It
BERLIN, GERMANY — December 20, 2018 IOTA Foundation, a non-profit foundation focused on distributed ledger technology (DLT) and permissionless ecosystem development, today announced a new lightweight trinary cryptographic hash function in collaboration with CYBERCRYPT A/S, a world leading system provider in robust cryptography and cyber security. IOTA Foundation commissioned CYBERCRYPT to develop a secure hash function for IOTA’s trinary architecture and platform. This hash function, named “Troika,” was developed by CYBERCRYPT’s expert cryptographers, and will lay a strong cryptographic foundation for the final IOTA protocol.
Troika has been designed to withstand all known cryptanalytic attacks, and is now being opened up to the public for evaluation. The IOTA Foundation and CYBERCRYPT will host a competition aimed at inviting cryptanalysts to evaluate Troika with a total prize pool valued at €200,000.
“The IOTA Foundation is honored and excited to be collaborating with CYBERCRYPT, to ensure we achieve world-leading security for the IOTA protocol. We hope that this competition will bring the cryptographic community together on solving security in the Internet-of-Things,” said David Sønstebø, Co-Founder and Co-chair of IOTA Foundation.
With Moore’s Law reaching its limits, the IoT industry is looking at new strategies, often called More-than-Moore (MtM), to increase the performance of computation, in order to satisfy an increasing demand for varied computational tasks. Nowhere is this more abundantly clear than in the ever growing Internet-of-Things, where energy constraints of billions of small devices are the deciding factor for implementation. Trinary has shown promise in varied fields of computation. Cryptography allows the storage and transmission of encrypted data so that it can only be read or processed by the intended recipient, an essential aspect to the security of IoT. With the introduction of trinary-based ...
To keep reading, please go to the original article at:
IOTA - Medium