Date Published: August 2015
Supersedes: FIPS 180-4 (March 2012)
Author(s)
National Institute of Standards and Technology
This standard specifies hash algorithms that can
be used to generate digests of messages. The digests are used to detect
whether messages have been changed since the digests were generated. The
Applicability Clause of this standard was revised to correspond with
the release of FIPS 202, "SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions," which specifies the SHA-3 family of hash
functions, as well as mechanisms for other cryptographic functions to be
specified in the future. The revision to the Applicability Clause
approves the use of hash functions specified in either FIPS 180-4 or
FIPS 202 when a secure hash function is required for the protection of
sensitive, unclassified information in Federal applications, including
as a component within other cryptographic algorithms and protocols.
This standard specifies hash algorithms that can
be used to generate digests of messages. The digests are used to detect
whether messages have been changed since the digests were generated.
The Applicability Clause of this standard was revised to correspond with
the release of FIPS 202, "SHA-3...
See full abstract
This standard specifies hash algorithms that
can be used to generate digests of messages. The digests are used to
detect whether messages have been changed since the digests were
generated. The Applicability Clause of this standard was revised to
correspond with the release of FIPS 202, "SHA-3 Standard:
Permutation-Based Hash and Extendable-Output Functions," which specifies
the SHA-3 family of hash functions, as well as mechanisms for other
cryptographic functions to be specified in the future. The revision to
the Applicability Clause approves the use of hash functions specified in
either FIPS 180-4 or FIPS 202 when a secure hash function is required
for the protection of sensitive, unclassified information in Federal
applications, including as a component within other cryptographic
algorithms and protocols.
Hide full abstract
Keywords
computer security; cryptography;
message digest; hash function; hash algorithm; Federal Information
Processing Standards; Secure Hash Standard
Control Families
System and Communications Protection;
System and Information Integrity;