Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publication Citation: Recommendation for Applications Using Approved Hash Algorithms

NIST Authors in Bold

Author(s): Quynh H. Dang;
Title: Recommendation for Applications Using Approved Hash Algorithms
Published: August 24, 2012
Abstract: Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs). [Supersedes SP 800-107 (February 2009): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901181]
Citation: Special Publication (NIST SP) - 800-107 Rev 1
Pages: 25 pp.
Keywords: digital signatures, hash algorithm, hash function, hash-based key derivation algorithms, hash value, HMAC, message digest, randomized hashing, random number generation, SHA, truncated hash values
Research Areas: Computer Security
PDF version: PDF Document Click here to retrieve PDF version of paper (233KB)