The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms
Shirley M. Radack
This bulletin summarizes information disseminated in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard; NIST Special Publication (SP) 800-107, Recommendation for Applications Using Approved Hash Algorithms, by Quynh Dang; SP 800-106, Randomized Hashing for Digital Signatures, by Quynh Dang; and Federal Register Notice (Vol. 72, No. 212, pp. 62212-20) published on November 2, 2007. The bulletin discusses a revision of the Federal government s standard for implementing secure hash functions. The bulletin also provides updated information about the process that ITL is conducting to develop a new, robust cryptographic hash algorithm through an open, public competition. References are given to web pages that can be accessed for more information about the standard, recommendations for implementation, and the public competition for a new algorithm that is needed because recent advances in the cryptanalysis of hash functions could threaten the security of cryptographic processes.
Cryptography, cryptographic hash function, digital signatures, Federal Information Processing Standards, hash algorithms, information security, message authentication, message digest, Secure Hash Standard
The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms, ITL Bulletin, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=902326
(Accessed June 10, 2023)