Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Secure Hash Algorithms

Index Secure Hash Algorithms

The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including. [1]

13 relations: Communications Security Establishment, Cryptographic hash function, Cryptographic Module Validation Program, Digital Signature Algorithm, Federal Information Processing Standards, MD5, National Institute of Standards and Technology, National Security Agency, Retronym, SHA-1, SHA-2, SHA-3, United States.

Communications Security Establishment

The Communications Security Establishment (CSE; Centre de la sécurité des télécommunications, CST), formerly called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency.

New!!: Secure Hash Algorithms and Communications Security Establishment · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Secure Hash Algorithms and Cryptographic hash function · See more »

Cryptographic Module Validation Program

The Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules.

New!!: Secure Hash Algorithms and Cryptographic Module Validation Program · See more »

Digital Signature Algorithm

The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital signatures.

New!!: Secure Hash Algorithms and Digital Signature Algorithm · See more »

Federal Information Processing Standards

Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States federal government for use in computer systems by non-military government agencies and government contractors.

New!!: Secure Hash Algorithms and Federal Information Processing Standards · See more »

MD5

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: Secure Hash Algorithms and MD5 · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Secure Hash Algorithms and National Institute of Standards and Technology · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: Secure Hash Algorithms and National Security Agency · See more »

Retronym

A retronym is a newer name for an existing thing that differentiates the original form or version from a more recent one.

New!!: Secure Hash Algorithms and Retronym · See more »

SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.

New!!: Secure Hash Algorithms and SHA-1 · See more »

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).

New!!: Secure Hash Algorithms and SHA-2 · See more »

SHA-3

SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015.

New!!: Secure Hash Algorithms and SHA-3 · See more »

United States

The United States of America (USA), commonly known as the United States (U.S.) or America, is a federal republic composed of 50 states, a federal district, five major self-governing territories, and various possessions.

New!!: Secure Hash Algorithms and United States · See more »

Redirects here:

SHA family, SHA family hash functions, SHA hash, SHA hash functions, Secure Hash Algorithm, Secure Hash Algorithm (Police), Secure Hash Algorithm (disambiguation), Secure Hash Algorithm family, Secure Hash Standard, Secure hash algorithm, Secure hash algorithms, Secure hash functions, Sha hash.

References

[1] https://en.wikipedia.org/wiki/Secure_Hash_Algorithms

OutgoingIncoming
Hey! We are on Facebook now! »