Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Quynh H. Dang;|
|Title:||Recommendation for Applications Using Approved Hash Algorithms|
|Published:||February 25, 2009|
|Abstract:||[Superseded by SP 800-107 Rev. 1 (August 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911479] Cryptographic hash functions that compute a fixed- length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved cryptographic hash functions specified in Federal Information Processing Standard (FIPS) 180-3. These include functions such as digital signature applications, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (HKDFs).|
|Citation:||Special Publication (NIST SP) - 800-107|
|Keywords:||digital signatures, hash algorithms, cryptographic hash function, hash function, hash-based key derivation algorithms, hash value, HMAC, message digest, randomized hashing, random number generation, SHA, truncated hash values.|
|Research Areas:||Computer Security, Threats & Vulnerabilities|