This bulletin summarizes the information that is included in revised Federal Information Processing Standard 180-4, Secure Hash Standard. The revised standard, announced in a March 6, 2012, Federal Register notice, was approved by the Secretary of Commerce to replace an earlier standard, FIPS 180-3. Seven hash algorithms are specified for use as components by other cryptographic algorithms and processes to provide information security services. The bulletin covers the changes implemented in FIPS 180-4, the process for the review and approval of the revised standard, the requirements for validation of hash algorithms, the functions of hash algorithms, and NIST's ongoing competition to select a new robust hash algorithm that will meet future requirements. References are provided to NIST publications and information that support the application of strong cryptographic methods.
Citation: ITL Bulletin -
NIST Pub Series: ITL Bulletin
Pub Type: NIST Pubs
computer security, cryptographic toolkit, Computer Model Validation Program, cryptography, Federal Information Processing Standards, hash algorithm, hash function, information security, information technology, message digest, NIST Special Publications, threats, vulnerabilities