U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

ITL Bulletin

Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection

Date Published: September 2015

Author(s)

Morris Dworkin (NIST), Larry Feldman (G2), Gregory Witte (G2)

Abstract

Keywords

computer security; cryptography; extendable-output function; Federal Information Processing Standard; hash algorithm; hash function; information security; KECCAK; message digest; permutation; SHA-3; sponge construction; sponge function; XOF
Control Families

System and Communications Protection; System and Information Integrity

Documentation

Publication:
September 2015 ITL Bulletin (pdf)

Supplemental Material:
None available

Document History:
09/24/15: ITL Bulletin (Final)

Topics

Security and Privacy

authentication, digital signatures