UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

FIPS PUB 180-4

Secure Hash Standard (SHS)

active, Most Current
Publication Date: 1 August 2015
Status: active
Page Count: 36
scope:

INTRODUCTION

This Standard specifies secure hash algorithms, SHA-1, SHA-224, SHA-256, SHA-384, SHA- 512, SHA-512/224 and SHA-512/256. All of the algorithms are iterative, one-way hash functions that can process a message to produce a condensed representation called a message digest. These algorithms enable the determination of a message's integrity: any change to the message will, with a very high probability, result in a different message digest. This property is useful in the generation and verification of digital signatures and message authentication codes, and in the generation of random numbers or bits.

Each algorithm can be described in two stages: preprocessing and hash computation. Preprocessing involves padding a message, parsing the padded message into m-bit blocks, and setting initialization values to be used in the hash computation. The hash computation generates a message schedule from the padded message and uses that schedule, along with functions, constants, and word operations to iteratively generate a series of hash values. The final hash value generated by the hash computation is used to determine the message digest.

The algorithms differ most significantly in the security strengths that are provided for the data being hashed. The security strengths of these hash functions and the system as a whole when each of them is used with other cryptographic algorithms, such as digital signature algorithms and keyed-hash message authentication codes, can be found in [SP 800-57] and [SP 800-107].

Document History

FIPS PUB 180-4
August 1, 2015
Secure Hash Standard (SHS)
INTRODUCTION This Standard specifies secure hash algorithms, SHA-1, SHA-224, SHA-256, SHA-384, SHA- 512, SHA-512/224 and SHA-512/256. All of the algorithms are iterative, one-way hash functions that...
March 1, 2012
Secure Hash Standard (SHS)
This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated.
October 1, 2008
Secure Hash Standard (SHS)
INTRODUCTION This Standard specifies five secure hash algorithms, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. All five of the algorithms are iterative, one-way hash functions that can process a...
August 1, 2002
SECURE HASH STANDARD
Applicability: This standard is applicable to all Federal departments and agencies for the protection of sensitive unclassified information that is not subject to section 2315 of Title 10, United...
April 17, 1995
SECURE HASH STANDARD
A description is not available for this item.
May 11, 1993
SECURE HASH STANDARD
A description is not available for this item.

References

Advertisement