UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ANSI - X9.30-2

Public Key Cryptography for the Financial Services Industry: Part 2: the Secure Hash Algorithm (SHA-1)

active, Most Current
Organization: ANSI
Publication Date: 6 January 1997
Status: active
Page Count: 39
scope:

Produces a 160-bit representation of the message, called the message digest, when a message with a bit length less than 2 to 64th power is input. The message digest is used during the generation of a signature for the message. The message digest is computed during the generation of a signature for the message. The SHA-1 is also used to compute a message digest for the received version of the message during the process of verifying the signature. Any change to the message in transit will, with a very high probability, result in a different messages digest, and the signature will fail to verify. The Secure Hash Algorithm (SHA-1) described in this standard is required for use with the Digital Signature Algorithm and may be used whenever a secure hash algorithm is required.

Document History

X9.30-2
January 6, 1997
Public Key Cryptography for the Financial Services Industry: Part 2: the Secure Hash Algorithm (SHA-1)
Produces a 160-bit representation of the message, called the message digest, when a message with a bit length less than 2 to 64th power is input. The message digest is used during the generation of a...

References

Advertisement