Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Elaine B. Barker; Quynh H. Dang;|
|Title:||Secure Hash Standard (SHS)|
|Published:||October 31, 2008|
|Abstract:||[Superseded by FIPS 180-4 (March 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910977] This standard specifies five hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated. [Supersedes FIPS 180-2 (August 2002 w/ Change Notice from 2/25/2004): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917976]|
|Citation:||Federal Inf. Process. Stds. (NIST FIPS) - 180-3|
|Keywords:||computer security, cryptography, message digest, hash function, hash algorithm, Federal Information Processing Standards, Secure Hash Standard|
|Research Areas:||Information Technology, Computer Security, Federal Information Processing Standards|