Difference between revisions of "Secure Hash Algorithms (SHA)"
Jump to navigation
Jump to search
Line 4: | Line 4: | ||
* [[SHA-3]] ([[2015]]): SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512 | * [[SHA-3]] ([[2015]]): SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512 | ||
* [[SHA-2]] ([[2001]]) | * [[SHA-2]] ([[2001]]) | ||
− | * [[ | + | * [[SHA-1]] ([[1995]]), 160-bit [[hash]] function. Deprecated. |
* SHA-0 ([[1993]]) | * SHA-0 ([[1993]]) | ||
Revision as of 05:35, 18 August 2021
wikipedia:Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS).
- SHA-256
- SHA-3 (2015): SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512
- SHA-2 (2001)
- SHA-1 (1995), 160-bit hash function. Deprecated.
- SHA-0 (1993)
ssh-rsa
public key signature algorithm depends on SHA-1
Related terms
See also
- RMD160, TIGER, CRC32, HAVAL, GOST
- SHA, SHA-0, SHA-1, SHA-2, SHA-3, SHA-256,
shasum, sha1sum, sha256sum, sha512sum
- MD5,
md5sum, bcrypt
, CRAM-MD5, SHA, filemd5 - Cypher: Hash, MD5, SHA, Bcrypt, Blowfish, HMAC, Equihash, Argon2
- Public-key cryptography: RSA, DSA, ECDSA, EdDSA (Ed25519), AES, RSA Conference, hash,
pkeyutl
, Signature, key length, Easyrsa, OAEP, Ron Rivest, Adi Shamir, Leonard Adleman - OpenSSH (changelog):
/etc/ssh/sshd_config
|/etc/ssh/ssh_config
|~/.ssh/
|openSSL | sshd logs
|sftp
|scp
|authorized_keys
|ssh-keygen
|ssh-keyscan
|ssh-add
|ssh-agent
|ssh
|Ssh -O stop
|ssh-copy-id
|CheckHostIP
|UseKeychain
, OpenSSF - NIST, SHA, AES, DSA, FIPS, NVD, CVSS, NIST Cybersecurity Framework, AAL3, SWID
Advertising: