U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

NIST SP 800-107 Rev. 1

Recommendation for Applications Using Approved Hash Algorithms

Date Published: August 2012

Supersedes: SP 800-107 (02/25/2009)

Planning Note (12/20/2022):

NIST has decided to withdraw SP 800-107 Rev. 1.

  • The supplementary material currently in SP 800-107 Rev. 1 has been moved to the hash functions webpage.
  • Next, the requirements listed in SP 800-107 Rev.1 that are not currently addressed in other standards will be moved to a new Implementation Guidance (IG) developed by the Cryptographic Module Validation Program (CMVP). These requirements will again be considered when hash-function-related standards are revised. Once the new IG has been published, NIST will withdraw SP 800-107 Rev. 1. 

See the full announcement and Crypto Publication Review Project for more details.


Author(s)

Quynh Dang (NIST)

Abstract

Keywords

hash function; hash-based key derivation algorithms; hash value; HMAC; message digest; randomized hashing; random number generation; SHA; truncated hash values.; Digital signatures; cryptographic hash function; hash algorithms
Control Families

Identification and Authentication; System and Communications Protection; System and Information Integrity

Documentation

Publication:
https://doi.org/10.6028/NIST.SP.800-107r1
Download URL

Supplemental Material:
None available

Document History:
08/24/12: SP 800-107 Rev. 1 (Final)