This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 139 lines
!!! Overview
[{$pagename}] is a [NIST Special Publication] titled as Recommendation for [Applications] Using Approved [Hash Algorithms|Hash Function]
!! ABstract
[Hash Functions] that compute a fixed-length [Message-Digest] from arbitrary length [messages] are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when
using [cryptographic] [applications] that employ the approved hash functions specified in [Federal Information Processing Standard] ([FIPS]) [180-4|FIPS 140]. These include functions such as [Digital Signatures], [Keyed-Hash Message Authentication Codes] ([HMACs]) and [Hash-based Key Derivation Functions] ([Hash]-based [KDFs])
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Recommendation for Applications Using Approved Hash Algorithms|https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-107r1.pdf|target='_blank'] - based on information obtained 2018-05-01-