Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Shirley M. Radack;|
|Title:||The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms|
|Published:||March 25, 2009|
|Abstract:||This bulletin summarizes information disseminated in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard; NIST Special Publication (SP) 800-107, Recommendation for Applications Using Approved Hash Algorithms, by Quynh Dang; SP 800-106, Randomized Hashing for Digital Signatures, by Quynh Dang; and Federal Register Notice (Vol. 72, No. 212, pp. 62212-20) published on November 2, 2007. The bulletin discusses a revision of the Federal government s standard for implementing secure hash functions. The bulletin also provides updated information about the process that ITL is conducting to develop a new, robust cryptographic hash algorithm through an open, public competition. References are given to web pages that can be accessed for more information about the standard, recommendations for implementation, and the public competition for a new algorithm that is needed because recent advances in the cryptanalysis of hash functions could threaten the security of cryptographic processes.|
|Keywords:||Cryptography, cryptographic hash function, digital signatures, Federal Information Processing Standards, hash algorithms, information security, message authentication, message digest, Secure Hash Standard,|
|Research Areas:||Information Technology, Computer Security|
|PDF version:||Click here to retrieve PDF version of paper (37KB)|