Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Shirley M. Radack;|
|Title:||Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS) 180-4|
|Published:||May 09, 2012|
|Abstract:||This bulletin summarizes the information that is included in revised Federal Information Processing Standard 180-4, Secure Hash Standard. The revised standard, announced in a March 6, 2012, Federal Register notice, was approved by the Secretary of Commerce to replace an earlier standard, FIPS 180-3. Seven hash algorithms are specified for use as components by other cryptographic algorithms and processes to provide information security services. The bulletin covers the changes implemented in FIPS 180-4, the process for the review and approval of the revised standard, the requirements for validation of hash algorithms, the functions of hash algorithms, and NIST's ongoing competition to select a new robust hash algorithm that will meet future requirements. References are provided to NIST publications and information that support the application of strong cryptographic methods.|
|Keywords:||computer security, cryptographic toolkit, Computer Model Validation Program, cryptography, Federal Information Processing Standards, hash algorithm, hash function, information security, information technology, message digest, NIST Special Publications, threats, vulnerabilities|
|Research Areas:||Information Technology, Cybersecurity|
|PDF version:||Click here to retrieve PDF version of paper (204KB)|