Published: January 11, 2013
Citation: Cryptologia vol. 37, no. 1, (2013) pp. 69-73
Author(s)
Quynh Dang
This paper describes the changes between FIPS 180-3 and FIPS 180-4. FIPS 180-4 specifies two new secure cryptographic hash algorithms: SHA-512/224 and SHA-512/256; it also includes a method for determining initial value(s) for any future SHA-512-based hash algorithm(s). FIPS 180-4 also removes a requirement for the execution of the message length encoding operation.
This paper describes the changes between FIPS 180-3 and FIPS 180-4. FIPS 180-4 specifies two new secure cryptographic hash algorithms: SHA-512/224 and SHA-512/256; it also includes a method for determining initial value(s) for any future SHA-512-based hash algorithm(s). FIPS 180-4 also removes a...
See full abstract
This paper describes the changes between FIPS 180-3 and FIPS 180-4. FIPS 180-4 specifies two new secure cryptographic hash algorithms: SHA-512/224 and SHA-512/256; it also includes a method for determining initial value(s) for any future SHA-512-based hash algorithm(s). FIPS 180-4 also removes a requirement for the execution of the message length encoding operation.
Hide full abstract
Keywords
FIPS 180; hash algorithm; hash function; SHA-512; SHA-512/224; SHA-512/256
Control Families
None selected