Try the new CSRC.nist.gov and let us know what you think!
(Note: Beta site content may not be complete.)
Algorithm specifications for current FIPS-approved and NIST-recommended secure hashing algorithms are available from the Cryptographic Toolkit.
Current testing includes the following algorithms:
Secure Hash Algorithm-3 Validation System (SHA3VS) specifies validation testing requirements for the SHA3 family of functions in FIPS 202.
Testing Notes
Secure Hash Standard Validation System (SHAVS) specifies validation testing requirements for the SHA-1 and SHA-2 family of functions in FIPS 180-4.
Testing Notes
Secure hashing implementations validated by NIST are found on the SHS and SHA-3 Validation Lists:
Use of these test vectors does not replace validation obtained through the CAVP.
The test vectors linked below can be used to informally verify the correctness of secure hash algorithm implementations (in FIPS 180-4 and FIPS 202) using the validation systems listed above.
Response files (.rsp): the test vectors are properly formatted in response (.rsp) files. Vendor response files must match this format exactly.
Intermediate results files (.txt): files with intermediate results (.txt) are supplied to help with debugging.
See the README file in each zip file for details.