Secure Hash Standard
E830581
The Secure Hash Standard is a U.S. federal standard that specifies secure hash algorithms (such as the SHA family) used for generating fixed-size cryptographic hashes to ensure data integrity and support digital signatures.
Statements (45)
| Predicate | Object |
|---|---|
| instanceOf |
U.S. federal information processing standard
ⓘ
cryptographic hash standard ⓘ |
| appliesTo | digital data ⓘ |
| basedOn | cryptographic hash function design principles ⓘ |
| constrains |
hash function output lengths
ⓘ
hash function security requirements ⓘ hash function test requirements ⓘ |
| countryOfOrigin |
United States of America
ⓘ
surface form:
United States
|
| currentVersionNumber | FIPS 180-4 NERFINISHED ⓘ |
| currentVersionPublicationYear | 2015 ⓘ |
| definesOutput | fixed-size cryptographic hash values ⓘ |
| documentType | FIPS publication NERFINISHED ⓘ |
| ensures |
detection of accidental data modification
ⓘ
support for cryptographic validation programs ⓘ |
| firstPublicationYear | 1993 ⓘ |
| firstVersionNumber | FIPS 180 GENERATED ⓘ |
| governs | federal government cryptographic applications ⓘ |
| hasAbbreviation | SHS NERFINISHED ⓘ |
| language | English ⓘ |
| maintainedBy | NIST Computer Security Division NERFINISHED ⓘ |
| partOf | U.S. Federal Information Processing Standards series NERFINISHED ⓘ |
| publishedBy |
NIST
NERFINISHED
ⓘ
National Institute of Standards and Technology NERFINISHED ⓘ |
| referencedIn | NIST Special Publications on cryptography NERFINISHED ⓘ |
| regulates | secure hash algorithms ⓘ |
| relatedTo |
Digital Signature Standard
NERFINISHED
ⓘ
FIPS 186 NERFINISHED ⓘ |
| scope | federal agencies and contractors ⓘ |
| specifies |
SHA-1
NERFINISHED
ⓘ
SHA-224 NERFINISHED ⓘ SHA-256 NERFINISHED ⓘ SHA-3 NERFINISHED ⓘ SHA-384 NERFINISHED ⓘ SHA-512 NERFINISHED ⓘ SHA-512/224 NERFINISHED ⓘ SHA-512/256 NERFINISHED ⓘ SHAKE128 NERFINISHED ⓘ SHAKE256 NERFINISHED ⓘ |
| standardNumber | FIPS 180 NERFINISHED ⓘ |
| status | active ⓘ |
| supports |
electronic records protection
ⓘ
public key infrastructure ⓘ |
| useCase |
data integrity
ⓘ
digital signatures ⓘ message authentication ⓘ |
Referenced by (1)
Full triples — surface form annotated when it differs from this entity's canonical label.