Computer Security Resource Center   nistlogo
Home Library Services Events Advisories Contact Site Map  
SEARCH


advanced search

Cryptographic Toolkit
 Guidance
 Encryption
 Modes of Operation
 Digital Signatures
 Secure Hashing
 Key Management
 RNG
 Message Authentication
 Entity Authentication

 Passwords

Project Sites
CMVP
PKI
Common Criteria
NIAP
Security Practices

Publications
 
 

Cryptographic Toolkit Header

Secure Hashing

There are four(4) FIPS-approved* algorithms for generating a condensed representation of a message (message digest): SHA-1, SHA-256, SHA-384, and SHA-512,.

SHA-1,

SHA-256,

SHA-384, and

SHA-512

FIPS 180-2, Secure Hash Standard (SHS), August 2002.

On August 26, 2002, NIST announced the approval of FIPS 180-2, Secure Hash Standard, which contains the specifications for the Secure Hash Algorithms (SHA-1, SHA-256, SHA-384, and SHA-256) with several examples.

Testing / Products

Testing requirements and a validation list are available for SHA-1 implementations. Additional testing for SHA-256, SHA-384, SHA-512 will be available in the near future.

Future Plans

None at this time.

Cryptographic Toolkit Return to crypto toolkit page

 

* NIST cryptographic standards are specified in Federal Information Processing Standards (FIPS) Publications. The term "FIPS-approved" indicates something (e.g., a cryptographic algorithm) that is either a) specified in a FIPS or b) adopted in a FIPS and specified either in an appendix to the FIPS or in a document referenced by the FIPS.