(SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 algorithms)
- Overview:
The Secure Hash Algorithms (SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512) are specified in FIPS 180-2 with Change Notice 1 dated February 25, 2004, Secure Hash Standard (SHS). - Testing Requirements:
CMT labs can test for conformance to the SHA algorithms in FIPS 180-2. The testing requirements for these algorithms can be found in the document titled The Secure Hash Algorithm Validation System (SHAVS). - Validation List:
NIST maintains the current SHA Validation List.
Secure Hash Standard (SHS)
SHA-1 Broken: Collision Attack Found, Implications for Cryptography
ahs_agenda.html
about_riemann.html
76.html
75.html
74.html
73.html
72.html
70.html
60.html
50.html
What Is Our Methodology?
Security Courses, Cryptography Consulting, System Evaluation & TTP Services
Bridging The Gap Between Scientific Research And Industry Needs