This bulletin summarizes the information that is included in revised Federal Information Processing Standard 180-4, Secure Hash Standard. The revised standard, announced in a March 6, 2012, Federal Register notice, was approved by the Secretary of Commerce to replace an earlier standard, FIPS 180-3. Seven hash algorithms are specified for use as components by other cryptographic algorithms and processes to provide information security services. The bulletin covers the changes implemented in FIPS 180-4, the process for the review and approval of the revised standard, the requirements for validation of hash algorithms, the functions of hash algorithms, and NIST's ongoing competition to select a new robust hash algorithm that will meet future requirements. References are provided to NIST publications and information that support the application of strong cryptographic methods.
This bulletin summarizes the information that is included in revised Federal Information Processing Standard 180-4, Secure Hash Standard. The revised standard, announced in a March 6, 2012, Federal Register notice, was approved by the Secretary of Commerce to replace an earlier standard, FIPS 180-3....
See full abstract
This bulletin summarizes the information that is included in revised Federal Information Processing Standard 180-4, Secure Hash Standard. The revised standard, announced in a March 6, 2012, Federal Register notice, was approved by the Secretary of Commerce to replace an earlier standard, FIPS 180-3. Seven hash algorithms are specified for use as components by other cryptographic algorithms and processes to provide information security services. The bulletin covers the changes implemented in FIPS 180-4, the process for the review and approval of the revised standard, the requirements for validation of hash algorithms, the functions of hash algorithms, and NIST's ongoing competition to select a new robust hash algorithm that will meet future requirements. References are provided to NIST publications and information that support the application of strong cryptographic methods.
Hide full abstract
Keywords
computer security; cryptographic toolkit; Computer Model Validation Program; cryptography; Federal Information Processing Standards; hash algorithm; hash function; information security; information technology; message digest; NIST Special Publications; threats; vulnerabilities