Difference between revisions of "Secure Hash Algorithms (SHA)"
Jump to navigation
Jump to search
Tags: Mobile web edit, Mobile edit |
m (Welcome moved page SHA to Secure Hash Algorithms (SHA)) |
||
(6 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
[[wikipedia:Secure Hash Algorithms]] are a family of cryptographic [[hash functions]] published by the [[National Institute of Standards and Technology]] (NIST) as a U.S. Federal Information Processing Standard ([[FIPS]]). | [[wikipedia:Secure Hash Algorithms]] are a family of cryptographic [[hash functions]] published by the [[National Institute of Standards and Technology]] (NIST) as a U.S. Federal Information Processing Standard ([[FIPS]]). | ||
− | * [[SHA-512]]: [[Ed25519]] | + | * [[SHA-512]]: [[Ed25519]]: <code>[[sha256sum]]</code> |
* [[SHA-3]] ([[2015]]): SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512 | * [[SHA-3]] ([[2015]]): SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512 | ||
* [[SHA-2]] ([[2001]]): [[SHA-256]] | * [[SHA-2]] ([[2001]]): [[SHA-256]] | ||
Line 18: | Line 18: | ||
* [[NIST]] | * [[NIST]] | ||
* [[NSA]] | * [[NSA]] | ||
− | * [[ | + | * [[crane digest]] |
== See also == | == See also == | ||
− | * RMD160, TIGER, CRC32, HAVAL, GOST | + | * [[RMD160]], [[TIGER]], [[CRC32]], [[HAVAL]], [[GOST]] |
+ | * {{TIGER}} | ||
* {{sha}} | * {{sha}} | ||
* {{md5}} | * {{md5}} | ||
* {{hash}} | * {{hash}} | ||
* {{RSA}} | * {{RSA}} | ||
− | |||
* {{NIST}} | * {{NIST}} | ||
− | + | [[Category:SHA]] | |
[[Category:Security]] | [[Category:Security]] |
Latest revision as of 12:09, 26 May 2024
wikipedia:Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS).
- SHA-512: Ed25519:
sha256sum
- SHA-3 (2015): SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512
- SHA-2 (2001): SHA-256
- SHA-1 (1995), 160-bit hash function. Deprecated. Disabled in OpenSSH 8.8 (September 2021)
- SHA-0 (1993)
ssh-rsa
public key signature algorithm depends on SHA-1
Related terms[edit]
- Keccak functions
shasum
openssl enc
doveadm pw -s SHA512-CRYPT
- NIST
- NSA
- crane digest
See also[edit]
- RMD160, TIGER, CRC32, HAVAL, GOST
- RMD160, TIGER, CRC32, HAVAL, GOST
- SHA, SHA-0, SHA-1, SHA-2, SHA-3, SHA-256,
shasum, sha1sum, sha256sum, sha512sum
- MD5,
md5sum, bcrypt
, CRAM-MD5, SHA, filemd5 - Cypher: Hash, MD5, SHA, Bcrypt, Blowfish, HMAC, Equihash, Argon2
- Public-key cryptography: RSA, DSA, ECDSA, EdDSA (Ed25519), AES, RSA Conference, hash,
pkeyutl
, Signature, key length, Easyrsa, OAEP, Ron Rivest, Adi Shamir, Leonard Adleman - NIST, SHA, AES, DSA, FIPS, NVD, CVSS, NIST Cybersecurity Framework, AAL3, SWID
Advertising: