Jump to content
  • Sky
  • Blueberry
  • Slate
  • Blackcurrant
  • Watermelon
  • Strawberry
  • Orange
  • Banana
  • Apple
  • Emerald
  • Chocolate
  • Charcoal

Welcome to your community. We would like you to take a minute and read our newcomers guide.

Sign in to follow this  

IOTA team announced new Lightweight Hash function

Recommended Posts

A new lightweight cryptographic hash function has been developed by the IOTA foundation in collaboration with CYBERCRYPT (a world-leading system provider in robust cryptography and cybersecurity). This announcement was made through the official blog of IOTA.

The professional cryptographers of CYBERCRYPT developed the new hash function referred to as "Troika," which will function as a strong cryptographic foundation for the final IOTA protocol. The creation of Troika was majorly for Tangle's (IOTA’s distributed ledger) trinary architecture. It requires less energy, making it the best fit for the Internet of Things (IoT).

In creating the new hash function, another important factor is the security. The IOTA foundation has revealed that Troika has a very strong security against all cryptanalytic attacks. To test their bold claims, the public is currently evaluating Troika.

The competition will be hosted by the IOTA foundation and CYBERSCRIPT and will reward those who successfully cracks the system. All successful participants will partake from the bounty reward of €200,000 ($227,600). Concerning this collaboration, David Sønstebø (IOTA co-founder) showed his enthusiasm:


The IOTA Foundation is honored and excited to be collaborating with CYBERCRYPT, to ensure we achieve world-leading security for the IOTA protocol. We hope that this competition will bring the cryptographic community together on solving security in the Internet-of-Things.



Hash Functions of IOTA

IOTA Tangle’s initial hash function: Curl and Keccack-384, will be succeeded by Troika. David Sønstebø has said that Curl (the in-house algorithm) was initially implemented due to the fact that IOTA did not have hundreds of thousands laying around to hire world-class cryptographers.


This all began July last year when a researcher from MIT's Digital Currency Initiative alerted the IOTA foundation of serious cryptographic weaknesses with the present implementation of Curl in IOTA. This resulted in several controversial emails between the MIT research team and the IOTA team, which somehow got to the public.

However, a month before the published report by the MIT which revealed these vulnerabilities the Keccack-384 was brought in to replace the Curl hash algorithm. Now the IOTA team hopes that the digital ecosystem for future IoT applications will be secured by Troika. The peer review of Troika has already taken place and the bounty program clearly reveals how confident the IOTA team is on the security of their new hash algorithm.

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this