Hash Functions | CSRC (2024)

    Projects Hash Functions

Project Overview

Approved Algorithms

Approved hash algorithms for generating a condensed representation of a message (message digest) are specified in two Federal Information Processing Standards: FIPS 180-4, Secure Hash Standard and FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.

FIPS 180-4 specifies seven hash algorithms:

  • SHA-1 (Secure Hash Algorithm-1), and the
  • SHA-2 family of hash algorithms: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.

FIPS 202 specifies the new SHA-3 family of permutation-based functions based on KECCAK as a result of the “SHA-3” Cryptographic Hash Algorithm Competition. FIPS 202 specifies:

  • Four fixed-length hash algorithms: SHA3-224, SHA3-256, SHA3-384, and SHA3-512; and
  • Two closely related, “extendable-output” functions (XOFs): SHAKE128 and SHAKE256.

Currently only the four fixed-length SHA-3 algorithms are approved hash algorithms, providing alternatives to the SHA-2 family of hash functions. The XOFs can be specialized to hash functions, subject to additional security considerations. Guideline for using the XOFs will be provided in the future.


SHA-3 Derived Functions

NIST SP 800-185, SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash and ParallelHash

In addition to four fixed-length hash functions, FIPS 202 also defines two eXtendable Output Functions, SHAKE128 and SHAKE256. Unlike the fixed-length hash functions, these SHAKE functions support variable-length outputs, and are named for their expected security level.

FIPS 202 also supports a flexible scheme for domain separation between different functions derived from KECCAK, ensuring that different named functions will produce unrelated outputs. NIST extends this flexibility further to allow users to customize their use of the functions by defining a customizable version of SHAKE, called cSHAKE.

Related Special Publications

NIST SP 800-106, Randomized Hashing for Digital Signatures provides recommendation for randomizing the hash input messages prior to signature generation to strengthen the security of the digital signatures being generated.

NIST SP 800-107 Revision 1, Recommendation for Using Approved Hash Algorithms provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions. These include applications such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs).

Testing Hash Function Implementations

Testing requirements and validation lists are available from the Cryptographic Algorithm Validation Program (CAVP).

Implementation-related References

Created January 04, 2017, Updated January 31, 2018

Hash Functions | CSRC (2024)
Top Articles
Kratos
How to enable TLS 1.2 or higher
Will Byers X Male Reader
Pollen Count Los Altos
Fort Morgan Hometown Takeover Map
Ups Stores Near
Kathleen Hixson Leaked
123 Movies Black Adam
Room Background For Zepeto
Watch Mashle 2nd Season Anime Free on Gogoanime
Bank Of America Appointments Near Me
Chastity Brainwash
Oxford House Peoria Il
Sport Clip Hours
Job Shop Hearthside Schedule
“In my day, you were butch or you were femme”
Red Tomatoes Farmers Market Menu
Labor Gigs On Craigslist
Craigslist West Valley
Van Buren County Arrests.org
Employee Health Upmc
A Cup of Cozy – Podcast
Cpt 90677 Reimbursem*nt 2023
Phantom Fireworks Of Delaware Watergap Photos
Bay Area Craigslist Cars For Sale By Owner
1145 Barnett Drive
Enduring Word John 15
Maisons près d'une ville - Štanga - Location de vacances à proximité d'une ville - Štanga | Résultats 201
Publix Coral Way And 147
How Much Is An Alignment At Costco
Gridwords Factoring 1 Answers Pdf
Citibank Branch Locations In Orlando Florida
Emiri's Adventures
Half Inning In Which The Home Team Bats Crossword
Emily Katherine Correro
Envy Nails Snoqualmie
Tamilyogi Ponniyin Selvan
Arcane Odyssey Stat Reset Potion
Back to the Future Part III | Rotten Tomatoes
Mohave County Jobs Craigslist
Gvod 6014
18 terrible things that happened on Friday the 13th
R/Moissanite
Uvalde Topic
Yakini Q Sj Photos
22 Golden Rules for Fitness Beginners – Barnes Corner Fitness
Zipformsonline Plus Login
New Starfield Deep-Dive Reveals How Shattered Space DLC Will Finally Fix The Game's Biggest Combat Flaw
Nfsd Web Portal
Unbiased Thrive Cat Food Review In 2024 - Cats.com
Honeybee: Classification, Morphology, Types, and Lifecycle
Latest Posts
Article information

Author: Kimberely Baumbach CPA

Last Updated:

Views: 5546

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Kimberely Baumbach CPA

Birthday: 1996-01-14

Address: 8381 Boyce Course, Imeldachester, ND 74681

Phone: +3571286597580

Job: Product Banking Analyst

Hobby: Cosplaying, Inline skating, Amateur radio, Baton twirling, Mountaineering, Flying, Archery

Introduction: My name is Kimberely Baumbach CPA, I am a gorgeous, bright, charming, encouraging, zealous, lively, good person who loves writing and wants to share my knowledge and understanding with you.