Date Published: October 2008
Withdrawn: March 06, 2012
Superseded By: FIPS 180-4 (March 2012)
Supersedes: FIPS 180-2 (August 2002 (Change Notice 1, 2/25/2004))
Author(s)
National Institute of Standards and Technology
This standard specifies five hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated.
This standard specifies five hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated.
Keywords
computer security; cryptography; message digest; hash function; hash algorithm; Federal Information Processing Standards; Secure Hash Standard
Control Families
None selected