Date Published: August 2015
Supersedes: FIPS 180-4 (March 2012)
Author(s)
National Institute of Standards and Technology
This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated. The Applicability Clause of this standard was revised to correspond with the release of FIPS 202, "SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions," which specifies the SHA-3 family of hash functions, as well as mechanisms for other cryptographic functions to be specified in the future. The revision to the Applicability Clause approves the use of hash functions specified in either FIPS 180-4 or FIPS 202 when a secure hash function is required for the protection of sensitive, unclassified information in Federal applications, including as a component within other cryptographic algorithms and protocols.
This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated. The Applicability Clause of this standard was revised to correspond with the release of FIPS 202, "SHA-3...
See full abstract
This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated. The Applicability Clause of this standard was revised to correspond with the release of FIPS 202, "SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions," which specifies the SHA-3 family of hash functions, as well as mechanisms for other cryptographic functions to be specified in the future. The revision to the Applicability Clause approves the use of hash functions specified in either FIPS 180-4 or FIPS 202 when a secure hash function is required for the protection of sensitive, unclassified information in Federal applications, including as a component within other cryptographic algorithms and protocols.
Hide full abstract
Keywords
computer security; cryptography; message digest; hash function; hash algorithm; Federal Information Processing Standards; Secure Hash Standard
Control Families
System and Communications Protection;
System and Information Integrity;