← Back to context

Comment by maqp

4 months ago

Ok so you have no idea who's vetting the algorithms at competitions. It's the other participants. That's going to be you among others. You get to break apart all the competing algorithms that claim to be better than yours. And they get to show you if yours is the weaker one, as they also want to win the competition.

Sure, you can't put fox to guard the henhouse that's how you get stuff like DUAL_EC. But that's not the case in modern competitions. They are open to the public, and academic in nature. Everyone gets to analyze them.

We don't know who you are, what are your credentials, and we don't have any proof of you showing you have what it takes to analyze current standards, let alone create new primitives resistant to cryptanalysis. Until you decide go the long way, you'll find yourself treated as yet another Crown Sterling.

> It's the other participants.

Even better, it's the general public. Anyone who wants to can publish an analysis at any time, even after the competition ends. If someone published a practical attack against SHA-3 tomorrow the recommended standards would change overnight.