Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Recommendation for Applications Using Approved Hash Algorithms

Published

Author(s)

Quynh H. Dang

Abstract

Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs). [Supersedes SP 800-107 (February 2009): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901181]
Citation
Special Publication (NIST SP) - 800-107 Rev 1
Report Number
800-107 Rev 1

Keywords

digital signatures, hash algorithm, hash function, hash-based key derivation algorithms, hash value, HMAC, message digest, randomized hashing, random number generation, SHA, truncated hash values

Citation

Dang, Q. (2012), Recommendation for Applications Using Approved Hash Algorithms, Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=911479 (Accessed October 7, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created August 24, 2012, Updated February 19, 2017