SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm)
- Helena HandschuhAffiliated withComputer Security and Industrial Cryptography Research Group, Katholieke Universiteit Leuven
The SHA (Secure Hash Algorithm) Family currently designates a family of six different hash functions: SHA-0, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 [9, 10] published by the American National Institute of Standards and Technology (NIST). They take variable length input messages and hash them to fixed-length outputs.
Hash functions are functions which take a variable input message and compute a fixed-length message digest for each such message. This digest serves as a digital fingerprint allowing a receiver to check that the original message has not been altered during transmission. Hash functions are unkeyed cryptographic primitives which do not guarantee authenticity. They can be combined with a secret key to produce a message authentication code. They also serve as a cryptographic primitive used in digital signature s ...
Reference Work Entry Metrics
- SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm)
- Reference Work Title
- Encyclopedia of Cryptography and Security
- pp 1190-1193
- Print ISBN
- Online ISBN
- Springer US
- Copyright Holder
- Springer Science+Business Media, LLC
- Additional Links
- Industry Sectors
- eBook Packages
- Editor Affiliations
- 376. Department of Mathematics and Computing Science, Eindhoven University of Technology
- 377. Center for Secure Information Systems, George Mason University
- Helena Handschuh (1)
- Author Affiliations
- 1. Computer Security and Industrial Cryptography Research Group, Katholieke Universiteit Leuven, Kasteel park Arenberg 10, 3001, Leuven - Heverlee, Belgium
To view the rest of this content please follow the download PDF link above.