The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including:
SHA-0: A retronym applied to the original version of the 160-bit hash function published in 1993 under the name "SHA". It was withdrawn shortly after publication due to an undisclosed "significant flaw" and replaced by the slightly revised version SHA-1.
SHA-1: A 160-bit hash function which resembles the earlier MD5 algorithm. This was designed by the National Security Agency (NSA) to be part of the Digital Signature Algorithm. Cryptographic weaknesses were discovered in SHA-1, and the standard was no longer approved for most cryptographic uses after 2010.
SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are also truncated versions of each standard, known as SHA-224, SHA-384, SHA-512/224 and SHA-512/256. These were also designed by the NSA.
SHA-3: A hash function formerly called Keccak, chosen in 2012 after a public competition among non-NSA designers. It supports the same hash lengths as SHA-2, and its internal structure differs significantly from the rest of the SHA family.
The corresponding standards are FIPS PUB 180 (original SHA), FIPS PUB 180-1 (SHA-1), FIPS PUB 180-2 (SHA-1, SHA-256, SHA-384, and SHA-512). NIST has updated Draft FIPS Publication 202, SHA-3 Standard separate from the Secure Hash Standard (SHS).
and 19 Related for: Secure Hash Algorithms information
A cryptographic hash function (CHF) is a hashalgorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
computational requirements than more recent SecureHashAlgorithms. MD5 is one in a series of message digest algorithms designed by Professor Ronald Rivest of...
this case is derived from a hash function which takes a data input and returns a fixed length of bits. Although hashalgorithms have been created with the...
used to ensure security, SipHash is fundamentally different from cryptographic hash functions like SecureHashAlgorithms (SHA) in that it is only suitable...
SHA-3 hashalgorithm. The winning hash function has been published as NIST FIPS 202 the "SHA-3 Standard", to complement FIPS 180-4, the SecureHash Standard...
output. The values returned by a hash function are called hash values, hash codes, hash digests, digests, or simply hashes. The values are usually used to...
hash, keyed hash, message authentication code, or protected checksum. Informally, a message authentication code system consists of three algorithms:...
check-digit algorithms (such as the Verhoeff algorithm and the Damm algorithm) can detect more transcription errors. The Luhn mod N algorithm is an extension...
bare digest algorithms, and so has been thought worth the effort. Cryptographic hash functions are a third type of cryptographic algorithm. They take a...
follows these steps: Calculate e = HASH ( m ) {\displaystyle e={\textrm {HASH}}(m)} . (Here HASH is a cryptographic hash function, such as SHA-2, with the...
theory and formal reduction. These functions are called Provably Secure Cryptographic Hash Functions. To construct these is very difficult, and few examples...
the hash ratchet HMAC. The following is a list of applications that use the Double Ratchet Algorithm or a custom implementation of it: ChatSecure Conversations...
through the idea of "reusable proof of work" using the 160-bit securehashalgorithm 1 (SHA-1). Proof of work was later popularized by Bitcoin as a foundation...
increasing computation power. The bcrypt function is the default password hashalgorithm for OpenBSD,[non-primary source needed] and was the default for some...
illustrated the importance of algorithm selection in securing passwords. Although bcrypt was employed to protect the hashes (making large scale brute-force...