Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection

Published: September 24, 2015

Author(s)

Morris J. Dworkin, Larry Feldman, Gregory A. Witte

Abstract

This bulletin summarizes the information presented in FIPS 202. The publication specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on binary data. Each of the SHA-3 functions is based on an instance of the KECCAK algorithm that NIST selected as the winner of the SHA-3 Cryptographic Hash Algorithm Competition.
Citation: ITL Bulletin -
NIST Pub Series: ITL Bulletin
Pub Type: NIST Pubs

Download Paper

Keywords

computer security, cryptography, extendable-output function, Federal Information Processing Standard. hash algorithm, hash function, information security, KECCAK, message digest, permutation, SHA-3, sponge construction, sponge function, XOF
Created September 24, 2015, Updated February 19, 2017