Date Published: August 2002
Withdrawn: February 25, 2004
Superseded By: FIPS 180-2 (August 2002 (Change Notice 1, 2/25/2004))
Supersedes: FIPS 180-1 (April 17, 1995)
Author(s)
National Institute of Standards and Technology
This standard specifies four secure hash algorithms, SHA-1, SHA-256, SHA-384, and SHA-512. All four of the algorithms are iterative, one-way hash functions that can process a message to produce a condensed representation called a message digest. These algorithms enable the determination of a message’s integrity: any change to the message will, with a very high probability, result in a different message digest. This property is useful in the generation and verification of digital signatures and message authentication codes, and in the generation of random numbers (bits).
This standard specifies four secure hash algorithms, SHA-1, SHA-256, SHA-384, and SHA-512. All four of the algorithms are iterative, one-way hash functions that can process a message to produce a condensed representation called a message digest. These algorithms enable the determination of a...
See full abstract
This standard specifies four secure hash algorithms, SHA-1, SHA-256, SHA-384, and SHA-512. All four of the algorithms are iterative, one-way hash functions that can process a message to produce a condensed representation called a message digest. These algorithms enable the determination of a message’s integrity: any change to the message will, with a very high probability, result in a different message digest. This property is useful in the generation and verification of digital signatures and message authentication codes, and in the generation of random numbers (bits).
Hide full abstract
Keywords
computer security; cryptography; message digest; hash function; hash algorithm; Federal Information Processing Standards; Secure Hash Standard
Control Families
None selected