Home | Library | Services | Events | Advisories | Contact |
Secure HashingThere are four(4) FIPS-approved* algorithms for generating a condensed representation of a message (message digest): SHA-1, SHA-256, SHA-384, and SHA-512,.
|
||||||||
* NIST cryptographic standards are specified in Federal Information Processing Standards (FIPS) Publications. The term "FIPS-approved" indicates something (e.g., a cryptographic algorithm) that is either a) specified in a FIPS or b) adopted in a FIPS and specified either in an appendix to the FIPS or in a document referenced by the FIPS. |
||||||||