Research Journal of Information Technology1815-74322151-7959Science International10.3923/rjit.2013.149.159ChauhanShilpa SobtiRajeev GeethaG. AnandSami 2201352The final round SHA-3 candidate algorithms are BLAKE, Skein, Groestl, Keccak and JH. This study brings together all the cryptanalysis performed on the five finalist algorithms in the Cryptographic Hash Algorithm Competition organized by NIST. In this study, one section for each candidate algorithm is dedicated to discuss the cryptanalysis results in detail. The timeline of the attacks, the manner in which it was attacked, analysis of the attacks and the success rate of the authors are elaborated in this study. A great deal of contributions is made by the cryptanalysts all around the globe and we have compiled all the results together with our own criticisms to take a better view of the cryptanalysis status of SHA-3 finalists.]]>Aumasson, J.P., W. Meier and R. Phan,2009Aumasson, J.P., C. Calik, W. Meier, O. Ozen, R.C.W. Phan and K. Varici,2009Aumasson, J.P., G. Leurent, W. Meier, F. Mendel and N. Mouha et al.,2011Aumasson, J.P. and W. Meier,2009Aumasson, J.P. and D. Khovratovich,2009Aumasson, J.P., J. Guo, S. Knellwolf, K. Matusiewicz and W. Meier,2010Bagheri, N.,2008Bertoni, G., J. Daemen, M. Peeters and G.V. Assche,2010Bhattacharyya, R., A. Mandal and M. Nandi,2010Biryukov, A., I. Nikolic and A. Roy,2011Boura, C. and A. Canteaut,2010Boura, C. and A. Canteaut,2010Boura, C., A. Canteaut and C. D. Canniere,2010Boura, C., A. Canteaut and C. De Canniere,2011Chang, D., M. Nandi and M. Yung,2011Duan, M. and X. Lai,2012Duc, A., J. Guo, T. Peyrin and L. Wei,2012Dunkelman, O. and D. Khovratovich,2011Gilbert, H. and T. Peyrin,2010Gligoroski, D.,2010Gligoroski, D.,2011Guo, J. and K. Matusiewicz,2009Ideguchi, K., E. Tischhauser and B. Preneel,2009Ji, L. and X. Liangyu,2009Chen, J. and K. Jia,2009Kaminsky, A.,2010Khovratovich, D. and I. Nikolic,2010Khovratovich, D., I. Nikolic and C. Rechberger,2010Khovratovich, D., G. Leurent and M. Naya-Plasencia,2011Khovratovich, D., C. Rechberger and A. Savelieva,2011Lathrop, J.,2009Manuel, S.,2008McKay, K.A. and P.L. Vora,2010Mendel, F., C. Rechberger, M. Schlaffer and S.S. Thomsen,2010Mendel, F., C. Rechberger, M. Schlaffer and S.S. Thomsen,2009Mendel, F., T. Peyrin, C. Rechberger and M. Schlaffer,2009Morawiecki, P. and M. Srebrny,2010Mouha, N., V. Velichkov, C. De Canniere and B. Preneel,2010Mendel, F. and S.S. Thomsen,2008Ming, M., H. Qiang and S. Zeng,2010NIST,2012Naya-Plasencia, M.,2010Peyrin, T.,2010Rijmen, V., D. Toz and K. Varici,2010Sasaki, Y., L. Wang and K. Aoki,2009Sasaki, Y., Y. Li, L. Wang, K. Sakiyama and K. Ohta,2010Schlaffer, M.,2011Schneier, B.,2009Su, B., W. Wu, S. Wu and L. Dong,2010Su, B., W. Wu, S. Wu and L. Dong,2010Bertoni, G., J. Daemen, M. Peeters and G. Van Assche,2011Turan, M.S. and E. Uyan,2010Vidali, J., P. Nose and E. Pasalic,2010Wang, L., K. Ohta and K. Sakiyama,2009Wu, H.,2009Xie, T. and D. Feng,2009