U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

secure hash algorithm (SHA)

Definition(s):

  A hash algorithm with the property that it is computationally infeasible 1) to find a message that corresponds to a given message digest, or 2) to find two different messages that produce the same message digest.
Source(s):
CNSSI 4009-2015 from FIPS 180-4 - Adapted

  The Secure Hash Algorithm defined in Federal Information Processing Standard 180-1.
Source(s):
NIST SP 800-22 Rev. 1a under SHA-1

  A hash function specified in FIPS 180-2, the Secure Hash Standard.
Source(s):
NIST SP 800-89 under SHA-1

  Secure Hash Algorithm.
Source(s):
NIST SP 800-56B Rev. 1 [Superseded] under SHA

  The SHA-1 hash for the resource.
Source(s):
NIST SP 800-70 Rev. 3 [Superseded] under SHA-1