A hash algorithm with the property that it is computationally infeasible 1) to find a message that corresponds to a given message digest, or 2) to find two different messages that produce the same message digest.
Source(s):
CNSSI 4009-2015
from
FIPS 180-4 - Adapted
The Secure Hash Algorithm defined in Federal Information Processing Standard 180-1.
Source(s):
NIST SP 800-22 Rev. 1a
under SHA-1
A hash function specified in FIPS 180-2, the Secure Hash Standard.
Source(s):
NIST SP 800-89
under SHA-1
Secure Hash Algorithm.
Source(s):
NIST SP 800-56B Rev. 1
[Superseded]
under SHA
The SHA-1 hash for the resource.
Source(s):
NIST SP 800-70 Rev. 3
[Superseded]
under SHA-1