SHA-2

Document

Aug 7, 2009 3:39 AM
Jun 10th, 2009

Description

Secure Hash Algorithm 2 (SHA-2)

Complete Definition

A cryptographic hash function used for securing information and messages. Generally, SHA-2 consist of SHA-224, SHA-256, SHA-384, and SHA-512.

The SHA hash functions are five cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. Hash algorithms compute a fixed-length digital representation (known as a message digest) of an input data sequence (the message) of any length


The five algorithms are denoted as SHA they are: SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. The latter four variants are sometimes collectively referred to as SHA-2. SHA-1 produces a message digest that is 160 bits long; the number in the other four algorithms' names denote the bit length of the digest they produce.

RFCs and references

Also See:

Overall Rating: 0 (0 ratings)

Actions

Login or Register to take actions

This Document

Posted June 10, 2009 at 12:57 AM
Updated August 7, 2009 at 3:39 AM
Stats:
Comments:0 Overall Rating:0
Views:4244 Contributors:0
Shares:0

Related Content

 

Documents Leaderboard

Rank Username Points
1
athukral
85
2
TCC_2
76
3
Nicolas Meessen
65
4
esundberg
30
5
PAWS
24
Rank Username Points
TCC_2
5