Sunteți pe pagina 1din 6

Security

Inside SHA-3 & Privacy


Lockdown

© cybrain/shutterstock.com

William Stallings

T
 he National Institute of Standards it could take years to find a suitable Accordingly, NIST announced in
and Technology (NIST) has selected replacement for SHA-2, should it 2007 a competition to produce the next
a new cryptographic hash algorithm become vulnerable, NIST decided to generation NIST hash function, to be
through a public competition. The new begin the process of developing a new called SHA-3. NIST completed its evalu-
hash algorithm is referred to as the hash standard. ation process and announced a final
Secure Hash Algorithm 3 (SHA-3) and is
intended to complement the SHA-2 hash
algorithms currently specified in Federal
Information Processing Standard (FIPS)
180-3, Secure Hash Standard. The
selected algorithm is intended to be suit-
able for use by the U.S. government as
well as the private sector and is available
royalty-free worldwide.
The winning design for SHA-3 was
announced by NIST in October 2012.
This article examines the internal struc-
ture and functions of SHA-3 and talks
about its future role in cryptographic
and security products.

SHA-3 origins
Throughout the 1990s, first MD5
and then SHA-1 were deployed in a
wide variety of cryptographic applica-
tions and security protocols. By 2004,
however, MD5 had been effectively
“broken.” In 2005, NIST announced the
intention to phase out approval of
SHA-1 and move to a reliance on
SHA-2 by 2010. Shortly thereafter, a
research team described an attack in
which two separate messages could be
found that deliver the same SHA-1
hash using 2 69 operations, far fewer
than the 2 80 operations previously
thought needed to find a collision with
an SHA-1 hash.
SHA-2, particularly the 512-b ver-
sion, would appear to provide unas-
© can stock photo/shkyo30

sailable security. However, SHA-2
shares the same structure and mathe-
matical operations as SHA-1 and MD5,
and this is a cause for concern. Because

Digital Object Identifier 10.1109/MPOT.2013.2254508


Date of publication: 4 November 2013

26 0278-6648/13/$31.00©2013IEEE IEEE POTENTIALS


standard in 2012. NIST selected Keccak A sponge function allows both vari- n = k # r. For uniformity, padding is
for the SHA-3 algorithm. Keccak was able length input and output, making it aalways added, so that if n mod r = 0, a
designed by a team of cryptographers flexible structure that can be used for apadding block of r b is added. The actual
from Belgium and Italy inclusing Guido hash function (fixed length output), a padding algorithm is a parameter of
Bertoni, Joan Daemen, Michaël Peeters, pseudorandom number generator (fixed the function.
and Gilles Van Assche. In their length input), and other cryptographic After processing all of the blocks, the
announcement, NIST explained the functions. Figure 1 illustrates this point.
sponge function generates a sequence
choice as follows: An input message of n b is partitioned of  output blocks Z 0, Z 1, f, Z j - 1 . The
NIST chose Keccak over the four into k fixed-size blocks of r b each. If number of output blocks generated is
other excellent finalists for its ele- necessary, the message is padded to determined by the number of output bits
gant design, large security margin, desired. If the desired output is , b, then j
achieve a length that is an integer multi-
good general performance, excel- ple of r b. The resulting partition is the
blocks are produced, such that (j - 1) #
lent efficiency in hardware imple- sequence of blocks P0, P1, f, Pk -1, withr < , # j # r.
mentations, and for its flexibil- Figure 2 shows the iterated
ity. Keccak uses a new “sponge structure of the sponge function.
construction” chaining mode, The sponge construction operates
based on a fixed permutation, k # r bits on a state variable s of b = r + c b,
n bits
that can readily be adjusted to which is initialized to all zeros and
Message pad
trade generic security strength modified at each iteration. The
for throughput, and can gener- value r is called the bit rate. This
ate larger or smaller hash out- value is the block size used to par-
puts as required. The Keccak tition the input message. The term
designers have also defined a r bits r bits r bits “bit rate” reflects the fact that r is
modified chaining mode for the number of bits processed at
P0 P1 Pk-1
Keccak that provides authenti- each iteration: the larger the value
cated encryption. (a) of r, the greater the rate at which
SHA-2 has held up well, and I bits message bits are processed by the
NIST considers it secure for gen- r bits r bits r bits sponge construction. The value c
eral use. So SHA-3 is a comple- Z0 Z1 is referred to as the capacity. A dis-
ment to SHA-2 rather than a cussion of the security implications
replacement. The relatively com- Zj-1 of the capacity is beyond our
pact nature of SHA-3 may make it (b) scope. In essence, the capacity is a
useful for so-called “embedded” measure of the achievable com-
or smart devices that connect to plexity of the sponge construction
Fig. 1 The sponge function (a) input and (b) output.
electronic networks but are not and therefore the achievable level
themselves full-fledged comput- of security.
ers. Examples include sensors in A given implementation can trade
a building-wide security system b b claimed security for speed by increas-
and home appliances that can be r c c r ing the capacity c and decreasing the
controlled remotely. r c 0r 0c r bit rate r accordingly, or vice-versa.
P0 0 c z 0 The default values for Keccak are
The sponge construction c = 1, 024 b, r = 576 b, and there-
The underlying structure of f f fore b = 1, 600 b.
SHA-3 is a scheme referred to by The sponge construction con-
s
its designers as a sponge construc- sists of two phases. The absorbing
tion. The sponge construction has P1 0 c z1 phase proceeds as follows: For
the same general structure as other each iteration, the input block to
iterated hash functions. As with f be processed is padded with
other iterated hash functions, the s (b)
zeroes to extend its length from r
sponge function takes an input b to b b. Then, the bitwise XOR of
message and partitions it into P2 0 c the extended message block and s
fixed-size blocks. Each block is is formed to create a b-b input
processed in turn with the output to the iteration function f. The
of each iteration fed into the next output of f is the value of s for the
iteration, finally producing an next iteration.
Pk-1 0 c
output block. If the desired output length ,
The sponge function is defined by f
satisfies , # b, then at the comple-
three parameters: tion of the absorbing phase, the
•• f is the internal function s first , b of s are returned and the
used to process each input block (a) sponge construction terminates.
•• r is the size in bits of the Otherwise, the sponge construc-
input blocks, called the bit rate Fig. 2 Sponge construction. (a) Absorbing phase and (b) tion enters the squeezing phase.
•• pad is the padding algorithm. squeezing phase. To begin, the first , b of s are

NOVEMBER/DECEMBER 201327
input and arbitrary output length based
x=0 x=1 x=2 x=3 x=4 on a fixed-length transformation or per-
y=4 L60, 4@ L61, 4@ L62, 4@ L63, 4@ L64, 4@
mutation f operating on a fixed number
b of bits.
y=3 L60, 3@ L61, 3@ L62, 3@ L63, 3@ L64, 3@ SHA-3 makes use of an iteration func-
tion f, labeled Keccak- f, which is
y=2 L60, 2@ L61, 2@ L62, 2@ L63, 2@ L64, 2@ described in the next section. The overall
y=1 L60, 1@ L61, 1@ L62, 1@ L63, 1@ L64, 1@ SHA-3 function is a sponge function
expressed as Keccak [r, c] to reflect that
y=0 L60, 0@ L61, 0@ L62, 0@ L63, 0@ L64, 0@ SHA-3 has two operational parameters, r,
the message block size, and c, the capac-
(a)
a6x, y, 0@ a6x, y, 1@ a6x, y, 2@ a6x, y, z@ a6x, y, 62@ a6x, y, 63@ ity. For SHA-3, the values of c and r
determine the hash size n , as follows:
•• n = 224, r = 1152, c = 448
•• n = 256, r = 1088, c = 512
(b) •• n = 384, r = 832, c = 768
•• n = 512, r = 576, c = 1024 .
Fig. 3 The SHA-3 state matrix. (a) State variable as 5 # 5 matrix A of 64-b words and In terms of the sponge algorithm
(b) bit labeling of 64-b words. defined above, Keccak [r, c] is defined as

retained as block Z 0 . Keccak 6r, c@ D SPONGE


Then, the value of s is  6Keccak - f 6r + c@, pad10 ) 1, r @ ,
s updated with repeated
executions of  f,  and at where pad 10 ) 1 appends a single bit 1
each iteration, the first , b followed by the minimum number of bits
Theta i Step
of s are retained as block 0 followed by a single bit 1 such that the
Z i and concatenated with length of the result is a multiple of the
p r ev i o u s l y   g e n e r a t e d block length. We now turn to a discussion
Rho t Step ROTIx, yM
blocks. The process con- of the iteration function Keccak- f.
tinues through  ( j - 1)
Round 0

Pi r Step
iterations until we have The SHA-3 iteration function f
( j - 1) # r < , # j # r. At The iteration function Keccak- f pro-
this point the first , b of cesses each successive block of the input
Chi | Step
the concatenated block Y message. Recall that f takes as input a
are returned. 1,600-b variable s consisting of r b, cor-
Note that the absorbing responding to the message block size fol-
Iota k Step RCQ0U phase has the structure of lowed by c b, referred to as the capacity.
a typical hash function. A For internal processing within f, the input
common case will be one state variable s is organized as a 5 # 5 # 64
in which the desired hash array a. The 64-b units are referred to as
length is less than or equal lanes. For our purposes, we generally use
to the input block length; the notation a [x, y, z] to refer to an indi-
that is , # r. In that case, vidual bit in the state array. When we are
the sponge construction more concerned with operations that
Theta i Step
terminates after the absorb- affect entire lanes, we designate the 5 # 5
ing phase. If a longer matrix as L [x, y], where each entry in L is
Rho t Step ROTIx, yM output than b b is required, a 64-b lane. The use of indices within this
then the squeezing phase matrix is shown in Fig. 3. Thus, the col-
is employed. Thus the umns are labeled x = 0 through x = 4,
Round 23

Pi r Step sponge construction is the rows are labeled y = 0 through


quite flexible. For exam- y = 4, and the individual bits within a
ple, a short message with a lane are labeled z = 0 through z = 63.
Chi | Step length r could be used as a The mapping between the bits of s and
seed and the sponge those of a is
construction would func-
Iota k Step RCQ23U tion as a pseudorandom s [64 (5y + x) + z] = a [x, y, z] .
number generator.
To   s u m m a r i z e ,  t h e We can visualize this with respect to
s sponge construction is a the matrix in Fig. 3. When treating the
simple iterated construc- state as a matrix of lanes, the first lane in
tion for building a func- the lower left corner, L [0, 0], corre-
Fig. 4 The SHA-3 iteration function f. tion F with variable-length sponds to the first 64 b of s. The lane in

28 IEEE POTENTIALS


the second column, lowest row, L[1, 0], L 6x, y@ ! L 6x, y@ 5 C 6x - 1@
c m =c m c m mod 5
x 0 1 3 1
5 ROT ^C 6x + 1@, 1 h .
corresponds to the next 64 b of s. Thus,
y 2 3 0
the array a is filled with the bits of s
=c mc mc m c m mod 5
0 1 0 1 0 1 1
starting with row y = 0 and proceeding Figure 5(a) illustrates the operation
2 3 2 3 2 3 0
row by row. on L[3,2]. The same operation is per-
=c mc m c m mod 5
0 1 0 1 0
The function f is executed once for formed on all of the other lanes in
2 3 2 3 2
each input block of the message to be the matrix.
=c m c m mod 5
0 1 2
hashed. The function takes as input the Several observations are in order.
2 3 6
1,600-b state variable and converts it into Each bit in a lane is updated using the
=c m c m mod 5
0 1 2
a 5 # 5 matrix of 64-b lanes. This matrix bit itself and one bit in the same bit
then passes through 24 rounds of pro- position from each lane in the preced- 2 3 1
= c m mod 5 = c m .
1 1
cessing. Each round consists of five steps, ing column and one bit in the adjacent
and each step updates the state matrix by bit position from each lane in the suc- 7 2
permutation or substitution operations. ceeding column. Thus the updated
As shown in Fig. 4, the rounds are identi- value of each bit depends on 11 b. This Table 1 shows the calculations that
cal with the exception of the final step in provides good mixing. Also, the theta are performed to determine the amount
each round, which is modified by a round step provides good diffusion. The of the bit shift and the location of each
constant that differs for each round. designers of Keccak state that the theta bit shift value. Note that all of the rota-
The steps have a simple description step provides a high level of diffusion tion amounts are different.
leading to a specification that is compact on average and that without theta, the The t function thus consists of a
and in which no trap door can be round function would not provide dif- simple permutation (circular shift) within
hidden. The operations on lanes in the fusion of any significance. each lane. The intent is to provide diffu-
specification are limited to bitwise Bool- The t function is defined as follows: sion within each lane. Without this func-
ean operations (XOR, AND, NOT) and tion diffusion between lanes would be
rotations. There is no need for table- t: a 6x, y, z @ ! a 6x, y, z @ if x = y = 0 very slow.
lookups, arithmetic operations, or data- The r function is defined as follows:
dependent rotations. Thus, SHA-3 is otherwise,
easily and efficiently implemented in r: a 6x, y@ ! a 6x l , y l@,
^t + 1 h^t + 2 h
t: a 6x, y, z @ ! a ;x, y, c z - mE
either hardware or software.
The Keccak reference defines the i 2 with
function as follows. For bit z in column (2)
c m=c m e o . (3)
x 0 1 xl
x, row y:
y 2 3 yl
i: a 6x, y, z @ ! a 6x, y, z @
with t satisfying 0 # t < 24 and

c m c m = c m in GF (5) 2 # 2 ,
0 1 t 1 x
5e a 6(x - 1), y l , z @o This can be rewritten as ^ x, y h #
4
/
^ y, ^2x + 3y hh . Thus, the lanes within the
yl =0
2 3 0 y

5e a 6(x + 1), y l , ^z - 1 h@o,


4
where GF (5) 2 # 2 means that arithmetic 5 # 5 matrix are moved so that the new
/
yl =0 will be done on 2 # 2 matrices and all x position equals the old y position and
(1) additions and multiplications will be the new y position is determined by
taken mod 5. ^ 2x + 3y h mod 5. Figure 6 helps in visu-
where the summations are iterated bitwise It is not immediately obvious what alizing this permutation. Lanes that are
XOR operations. We can see more clearly this step performs, so let us look at the along the same diagonal (increasing in y
what this operation accomplishes with ref- process in detail. value going from left to right) prior to r
erence to Figure 5a. First, define the bit- 1) The lane in position ^ x, y h = ^0, 0 h, are arranged on the same row in the
wise XOR of the lanes in column x as: that is L [0, 0], is unaffected. For all other matrix after r is executed. Note that the
words, a circular bit shift within the lane position of L [0, 0], is unchanged.
C 6x@ = L 6x, 0@ 5 L 6x, 1@ 5 L 6x, 2@ is performed. Thus the r step is a permutation of
5 L 6x, 3@ 5 L 6x, 4@ . 2) The variable t, with 0 # t < 24, is lanes: the lanes move position within
used to determine both the amount of the 5 # 5 matrix. The t step is a per-
Consider lane L 6x, y@ in column x, the circular bit shift and which lane is mutation of bits: bits within a lane are
row y. The first summation in (1) per- assigned which shift value. rotated. Note that the r step matrix
forms a bitwise XOR of the lanes in 3) The 24 individual bit shifts that positions are calculated in the same
column ^ x - 1 h mod 4 to form the 64-b are performed have the respective way that, for the t step, the one-
lane C 6x - 1@ . The second summation values [^t + 1 h^t + 2 h] /2 mod 64. dimensional sequence of rotation
performs a bitwise XOR of the lanes in 4) The shift determined by the value constants is mapped to the lanes of
column (x + 1) mod 4, and then rotates of t is performed on the lane in position the matrix.
the bits within the 64-b lane so that the (x, y) in the 5 # 5 matrix of lanes. Spe- The | function is defined as follows:
bit in position z is mapped into position cifically, for each value of t, the corre-
z + 1 mod 64. This forms the lane ROT sponding matrix position is defined by |: a 6x@ ! a 6x@ 5 ^^ a 6x + 1@ 5 1 h
^ C 6x + 1@, 1 h . These two lanes and
AND a 6x + 2@h .

(4)
c m =c m c m . For example, for t = 3,
x 0 1 1
L 6x, y@ are combined by bitwise XOR
t

to form the updated value of L 6x, y@ .


y 2 3 0
This function operates to update each
This can be expressed as we have: bit based on its current value and the

NOVEMBER/DECEMBER 201329
The future of SHA-3
NIST published SHA-3 as a draft stan-
x=0 x=1 x=2 x=3 x=4
dard for public comment in the latter part
y=4 L60, 4@ L61, 4@ L62, 4@ L63, 4@ L64, 4@ of 2013. As of this writing, it is expected
y=3 L60, 3@ L61, 3@ L62, 3@ L63, 3@ L64, 3@ that the final standard will be published by
the middle of 2014. It may be some time
y=2 L60, 2@ L61, 2@ L62, 2@ L63, 2@ L64, 2@ before we see commercially available
implementations in cryptographic algo-
y=1 L60, 1@ L61, 1@ L62, 1@ L63, 1@ L64, 1@
rithms and protocols. And because SHA-2
y=0 L60, 0@ L61, 0@ L62, 0@ L63, 0@ L64, 0@ continues to be viewed as secure, it is
unlikely that SHA-3 will completely sup-
plant SHA-2. But, with its high level of
L62, 3@ C61@ Lt62, 3@ ROT(C63@, 1)
security, its implementation efficiency, and
(a) the prestige of having prevailed in a com-
petition, SHA-3 is likely to become a widely
x=0 x=1 x=2 x=3 x=4
used hash function. An additional advan-
y=4 L60, 4@ L61, 4@ L62, 4@ L63, 4@ L64, 4@ tage of having both SHA-2 and SHA-3 as
y=3 L60, 3@ L61, 3@ L62, 3@ L63, 3@ L64, 3@ standard hash functions is that the two
hash functions have fundamentally differ-
y=2 L60, 2@ L61, 2@ L62, 2@ L63, 2@ L64, 2@ ent structures and use quite different math-
y=1 L60, 1@ L61, 1@ L62, 1@ L63, 1@ L64, 1@ ematical operations. Thus, any cryptanalytic
attack that is developed that tends to
y=0 L60, 0@ L61, 0@ L62, 0@ L63, 0@ L64, 0@ weaken one of the two hash functions is
unlikely to be useful against the other.
L62, 3@ L62, 3@ L63, 3@ AND L64, 3@
Acknowledgment
(b) I would like to thank the designers
of Keccak, who reviewed a draft of
Fig. 5 Theta and chi step functions. (a) i step function and (b) | step function. this article.

Read more about it


Table 1. Rotation values used in SHA-3.
Figure 5(b) illustrates • X. Wang and H. Yu, “How to
the operation of the | break MD5 and other hash functions,”
g(t) g(t)
t g(t) mod 64 x, y t g(t) mod 64 x, y function on the bits of the in Advances in Cryptology, Proceedings
64-b lane L[3, 2]. This is Eurocrypt (Lecture Notes in Computer
0 1 1 1, 0 12 91 27 4, 0
the only one of the step Science, vol. 3494), R. Cramer, Ed. New
1 3 3 0, 2 13 105 41 0, 3 functions that is a nonlin- York: Springer-Verlag, 2005, pp. 19–35.
2 6 6 2, 1 14 120 56 3, 4
ear mapping. Without it, • X. Wang, Y. Yin, and H. Yu,
the SHA-3 round function “Finding collisions in the full SHA-1,”
3 10 10 1, 2 15 136 8 4, 3 would be linear. in Advances in Cryptology, Proceed-
4 15 15 2, 3 16 153 25 3, 2 The k function is ings Crypto (Lecture Notes in Computer
5 21 21 3, 3 17 171 43 2, 2 defined as Science, vol. 3621), V. Shoup, Ed. New
k: a ! a 5 RC 6i r@ .(5)
York: Springer-Verlag, 2005, pp. 1–16.
6 28 28 3, 0 18 190 62 2, 0
• B. Preneel, “The first 30 years of
7 36 36 0, 1 19 210 18 0, 4 This function combines cryptographic hash functions and the NIST
8 45 45 1, 3 20 231 39 4, 2 each 64-b array element SHA-3 competition,” in Proc. CT-RSA Int.
9 55 55 3, 1 21 253 61 2, 4 with a round constant that Conf. Topics Cryptology, 2010, pp. 1–14.
differs for each round. It • W. Burr, “A new hash competi-
10 66 2 1, 4 22 276 20 4, 1
breaks up any symmetry tion,” IEEE Security Privacy, vol. 6, no.
11 78 14 4, 4 23 300 44 1, 1 induced by the other four 3, pp. 60–62, May–June 2008.
routines. In fact, (5) is • National Institute of Standards
somewhat misleading. The and Technology, “Announcing request
round constant is applied for candidate algorithm nominations
value of the corresponding bit position only to the first lane of the internal state for a new cryptographic hash algorithm
in the next two lanes in the same row. array. We express this is as (SHA-3) family,” Federal Register, vol. 72,
L 60, 0@ ! L 60, 0@ 5 RC 6i r@
The operation is more clearly seen if we no. 212, pp. 62212–62220, Nov. 2007.
consider a single bit a 6x, y, z @ and write
0 # i r # 24 .
• T. Harbert, “New King of security
out the Boolean expression: From round to round, the permutations algorithms crowned,” IEEE Spectr., vol.
and substitutions propagate the effects of 49, no. 12, pp. 12–13, Dec. 2012.
a 6x, y, z @ ! a 6x, y, z @ 5 the k function to all of the lanes and all of the • G. Bertoni, G. Bertoni, J. Daemen,
bit positions in the matrix. It is easily seen M. Peeters, and G. Van Assche, “Sponge
^NOT ^ a 6x + 1, y, z @hh
that the disruption diffuses through i and | functions,” in Ecrypt Hash Workshop,
AND ^a 6x + 2, y, z @h . to all lanes of the state after a single round. May 2007.

30 IEEE POTENTIALS


x=0 x=1 x=2 x=3 x=4
w2 w4 w1 w 3
w 0
Ro Ro Ro Ro Ro x=0 x=1 x=2 x=3 x=4
y = 4 L60, 4@ L61, 4@ L62, 4@ L63, 4@ L64, 4@ w2 y = 4 L62, 0@ L63, 1@ L64, 2@ L60, 3@ L61, 4@
Ro
y = 3 L60, 3@ L61, 3@ L62, 3@ L63, 3@ L64, 3@ w4 y = 3 L64, 0@ L60, 1@ L61, 2@ L62, 3@ L63, 4@
Ro
y = 2 L60, 2@ L61, 2@ L62, 2@ L63, 2@ L64, 2@ w1 y = 2 L61, 0@ L62, 1@ L63, 2@ L64, 3@ L60, 4@
Ro
y = 1 L60, 1@ L61, 1@ L62, 1@ L63, 1@ L64, 1@ w3 y = 1 L63, 0@ L64, 1@ L60, 2@ L61, 3@ L62, 4@
Ro
y = 0 L60, 0@ L61, 0@ L62, 0@ L63, 0@ L64, 0@ y = 0 L60, 0@ L61, 1@ L62, 2@ L63, 3@ L64, 4@

(b)

(a)

Fig. 6 Pi step function. (a) Lane position at the start of step and (b) lane position after the permutation.

• G. Bertoni, J. Daemen, M. Peeters, About the author maintains the Computer Science Student
and G. Van Assche. (2011, Jan.). Cryp- William Stallings (wllmst@me.com) is a Resource Site at ComputerScienceStudent.
tographic sponge functions. [Online]. consultant, lecturer, and author of numer- com. This site provides documents and
Available: http://sponge.noekeon.org/ ous computer science textbooks on cryp- links on a variety of subjects of general
• W. Stallings, Cryptography and tography, computer organization, operating interest to computer science students (and
Network Security: Principles and Prac- systems, and computer networking. His professionals). He is a member of the edi-
tice, 6th ed. Upper Saddle River, NJ: latest book is Cryptography and Network torial board of Cryptologia, a scholarly
Pearson, 2013. Security (Pearson. 2013). He created and journal devoted to all aspects of cryptology.

the way ahead (continued from page 3)

with SB Chapters and Chapters within your Section that align IEEE SB AWARDS: The Student Activities Committee (SAC)
with the technical interests of IEEE, offers you, and your is pleased to announce this year’s recipients of the SAC Awards.
IEEE SB, maximum support and maximum exposure to the There were a total of five awards for which students were eli-
larger IEEE. gible to submit nominations. Each award recognizes a differ-
As a student, have you ever attended a Section meeting or ent area of student leadership and success. The SAC is also
any Section event? Do you invite your Section leaders to your pleased to report that there was a 200% increase in nominations
IEEE SB events? The benefits of interaction between an IEEE received for this year’s award cycle compared to the previous
Section and an IEEE SB include: year. Please check the Student Activities Web site (www.ieee.
•• increased number of successful Section and SB events org/students) for a list of all recipients of the following awards:
and meetings with increased attendance •• IEEE Student Enterprise Award
•• open doors for meetings, networking opportunities, •• Larry K. Wilson Regional Student Activities Award
and other events held jointly between Sections and SBs •• IEEE Regional Exemplary Student Branch Award
•• future skilled volunteers for the Section as students •• IEEE Outstanding Branch Counselor and Advisor Award
graduate and elevate to higher grade membership Recognition Program
•• potential increase in the number of active Chapters in •• The Darrel Chong Student Activity Award.
SBs and Sections. The nomination process for the upcoming year will begin
Some ideas for IEEE Section and IEEE SB engagement include: in November 2013 with all nominations due by February 2014.
•• holding Section Executive Committee meetings at universities Please check https://ieee-student-awards.myreviewroom.com for
•• having a student serve on the Section ExCom as a vot- more details and specific deadlines. If you have questions regard-
ing member ing the awards program, please contact student-services@ieee.org.
•• the Section providing a mentor for the SB I like to close out each of my columns in the same manner—
•• planning and holding joint Section and SB technical with a request to please drop me a note at anytime to share
activities and professional awareness activities, such as a Stu- your thoughts on the value of your IEEE student membership
dent Professional Awareness Conference and to share a story or example of what your IEEE membership
•• SBs can request modest funding support from Sections engagement means to you. I would also like to here about how
for specific campus events. your IEEE SB has successfully interacted with your IEEE Section.
I encourage you, as an IEEE SB, to reach out to your local John Paserba
Section and build a relationship with them. The potential IEEE MGA Chair—Student Activities
benefits are worth the effort to engage. (j.paserba@ieee.org)

NOVEMBER/DECEMBER 201331

S-ar putea să vă placă și