0% found this document useful (0 votes)
114 views

Secure Hash Algorithm

The Secure Hash Algorithm (SHA) is a family of cryptographic hash functions published by the National Institute of Standards and Technology. SHA-1 produces a 160-bit hash value and was designed by the National Security Agency, but weaknesses were found after 2010. SHA-2 was published in 2001 and is significantly different from SHA-1. While no attacks have been found against SHA-2, its structure is similar to the weakened SHA-1, so NIST and technology companies have begun phasing out the use of SHA-1.

Uploaded by

Amulya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views

Secure Hash Algorithm

The Secure Hash Algorithm (SHA) is a family of cryptographic hash functions published by the National Institute of Standards and Technology. SHA-1 produces a 160-bit hash value and was designed by the National Security Agency, but weaknesses were found after 2010. SHA-2 was published in 2001 and is significantly different from SHA-1. While no attacks have been found against SHA-2, its structure is similar to the weakened SHA-1, so NIST and technology companies have begun phasing out the use of SHA-1.

Uploaded by

Amulya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Secure Hash Algorithm

From Wikipedia, the free encyclopedia


The Secure Hash Algorithm is a family of cryptographic hash functions published by the
National Institute of Standards and Technology (NIST) as a U.S. Federal Information
Processing Standard (FIPS), including:

SHA-1: A 160-bit hash function which resembles the earlier MD5 algorithm. This
was designed by the National Security Agency (NSA) to be part of the Digital
Signature Algorithm. Cryptographic weaknesses were discovered in SHA-1, and the
standard was no longer approved for most cryptographic uses after 2010.

In cryptography, SHA-1 is a cryptographic hash function designed by the United


States National Security Agency and is a U.S. Federal Information Processing
Standard published by the United States NIST.[2]

SHA-1 produces a 160-bit (20-byte) hash value known as a message digest. A SHA-1
hash value is typically rendered as a hexadecimal number, 40 digits long.

SHA stands for "secure hash algorithm". The four SHA algorithms are structured
differently and are named SHA-0, SHA-1, SHA-2, and SHA-3. SHA-0 is the original
version of the 160-bit hash function published in 1993 under the name "SHA": it was
not adopted by many applications. Published in 1995, SHA-1 is very similar to SHA0, but alters the original SHA hash specification to correct alleged weaknesses. SHA2, published in 2001, is significantly different from the SHA-1 hash function.

SHA-1 is the most widely used of the existing SHA hash functions, and is employed
in several widely used applications and protocols.

In 2005, cryptanalysts found attacks on SHA-1 suggesting that the algorithm might
not be secure enough for ongoing use.[3] NIST required many applications in federal
agencies to move to SHA-2 after 2010 because of the weakness.[4] Although no
successful attacks have yet been reported on SHA-2, it is algorithmically similar to
SHA-1. In 2012, following a long-running competition, NIST selected an additional
algorithm, Keccak, for standardization under SHA-3.[5][6] In November 2013
Microsoft announced their deprecation policy on SHA-1 according to which Windows
will stop accepting SHA-1 certificates in SSL by 2017.[7] In September 2014 Google
announced their deprecation policy on SHA-1 according to which Chrome will stop
accepting SHA-1 certificates in SSL in a phased way by 2017.[8] Mozilla is also
planning to stop accepting SHA-1-based SSL certificates by 2017.[9][10][11]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy