13 relations: Communications Security Establishment, Cryptographic hash function, Cryptographic Module Validation Program, Digital Signature Algorithm, Federal Information Processing Standards, MD5, National Institute of Standards and Technology, National Security Agency, Retronym, SHA-1, SHA-2, SHA-3, United States.
Communications Security Establishment
The Communications Security Establishment (CSE; Centre de la sécurité des télécommunications, CST), formerly called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency.
New!!: Secure Hash Algorithms and Communications Security Establishment · See more »
Cryptographic hash function
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.
New!!: Secure Hash Algorithms and Cryptographic hash function · See more »
Cryptographic Module Validation Program
The Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules.
New!!: Secure Hash Algorithms and Cryptographic Module Validation Program · See more »
Digital Signature Algorithm
The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital signatures.
New!!: Secure Hash Algorithms and Digital Signature Algorithm · See more »
Federal Information Processing Standards
Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States federal government for use in computer systems by non-military government agencies and government contractors.
New!!: Secure Hash Algorithms and Federal Information Processing Standards · See more »
MD5
The MD5 algorithm is a widely used hash function producing a 128-bit hash value.
New!!: Secure Hash Algorithms and MD5 · See more »
National Institute of Standards and Technology
The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.
New!!: Secure Hash Algorithms and National Institute of Standards and Technology · See more »
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.
New!!: Secure Hash Algorithms and National Security Agency · See more »
Retronym
A retronym is a newer name for an existing thing that differentiates the original form or version from a more recent one.
New!!: Secure Hash Algorithms and Retronym · See more »
SHA-1
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.
New!!: Secure Hash Algorithms and SHA-1 · See more »
SHA-2
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).
New!!: Secure Hash Algorithms and SHA-2 · See more »
SHA-3
SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015.
New!!: Secure Hash Algorithms and SHA-3 · See more »
United States
The United States of America (USA), commonly known as the United States (U.S.) or America, is a federal republic composed of 50 states, a federal district, five major self-governing territories, and various possessions.
New!!: Secure Hash Algorithms and United States · See more »
Redirects here:
SHA family, SHA family hash functions, SHA hash, SHA hash functions, Secure Hash Algorithm, Secure Hash Algorithm (Police), Secure Hash Algorithm (disambiguation), Secure Hash Algorithm family, Secure Hash Standard, Secure hash algorithm, Secure hash algorithms, Secure hash functions, Sha hash.