<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.sarg.dev/index.php?action=history&amp;feed=atom&amp;title=Secure_Hash_Algorithms</id>
	<title>Secure Hash Algorithms - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.sarg.dev/index.php?action=history&amp;feed=atom&amp;title=Secure_Hash_Algorithms"/>
	<link rel="alternate" type="text/html" href="https://wiki.sarg.dev/index.php?title=Secure_Hash_Algorithms&amp;action=history"/>
	<updated>2026-04-17T17:58:52Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.44.2</generator>
	<entry>
		<id>https://wiki.sarg.dev/index.php?title=Secure_Hash_Algorithms&amp;diff=536106&amp;oldid=prev</id>
		<title>imported&gt;Dimawik: Undid revision 1310553320 by 2405:3800:81A:F2D9:3458:FF59:926D:4422 (talk) rm sp</title>
		<link rel="alternate" type="text/html" href="https://wiki.sarg.dev/index.php?title=Secure_Hash_Algorithms&amp;diff=536106&amp;oldid=prev"/>
		<updated>2025-09-10T11:36:08Z</updated>

		<summary type="html">&lt;p&gt;Undid revision &lt;a href=&quot;/index.php/Special:Diff/1310553320&quot; title=&quot;Special:Diff/1310553320&quot;&gt;1310553320&lt;/a&gt; by &lt;a href=&quot;/index.php/Special:Contributions/2405:3800:81A:F2D9:3458:FF59:926D:4422&quot; title=&quot;Special:Contributions/2405:3800:81A:F2D9:3458:FF59:926D:4422&quot;&gt;2405:3800:81A:F2D9:3458:FF59:926D:4422&lt;/a&gt; (&lt;a href=&quot;/index.php?title=User_talk:2405:3800:81A:F2D9:3458:FF59:926D:4422&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;User talk:2405:3800:81A:F2D9:3458:FF59:926D:4422 (page does not exist)&quot;&gt;talk&lt;/a&gt;) rm sp&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{short description|Family of cryptographic hash functions}}&lt;br /&gt;
&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;Secure Hash Algorithms&amp;#039;&amp;#039;&amp;#039; are a family of [[cryptographic hash function]]s published by the [[National Institute of Standards and Technology]] (NIST) as a [[United States of America|U.S.]] [[Federal Information Processing Standard]] (FIPS), including:&lt;br /&gt;
&lt;br /&gt;
*&amp;#039;&amp;#039;&amp;#039;[[SHA-0]]&amp;#039;&amp;#039;&amp;#039;: A [[retronym]] applied to the original version of the 160-bit hash function published in 1993 under the name &amp;quot;SHA&amp;quot;. It was withdrawn shortly after publication due to an undisclosed &amp;quot;significant flaw&amp;quot; and replaced by the slightly revised version SHA-1.&lt;br /&gt;
*&amp;#039;&amp;#039;&amp;#039;[[SHA-1]]&amp;#039;&amp;#039;&amp;#039;: A 160-bit hash function which resembles the earlier [[MD5]] algorithm. This was designed by the [[National Security Agency]] (NSA) to be part of the [[Digital Signature Algorithm]]. Cryptographic weaknesses were discovered in SHA-1, and the standard was no longer approved for most cryptographic uses after 2010.&lt;br /&gt;
*&amp;#039;&amp;#039;&amp;#039;[[SHA-2]]&amp;#039;&amp;#039;&amp;#039;: A family of two similar hash functions, with different block sizes, known as &amp;#039;&amp;#039;SHA-256&amp;#039;&amp;#039; and &amp;#039;&amp;#039;SHA-512&amp;#039;&amp;#039;. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are also truncated versions of each standard, known as &amp;#039;&amp;#039;SHA-224&amp;#039;&amp;#039;, &amp;#039;&amp;#039;SHA-384&amp;#039;&amp;#039;, &amp;#039;&amp;#039;SHA-512/224&amp;#039;&amp;#039; and &amp;#039;&amp;#039;SHA-512/256&amp;#039;&amp;#039;. These were also designed by the NSA.&lt;br /&gt;
*&amp;#039;&amp;#039;&amp;#039;[[SHA-3]]&amp;#039;&amp;#039;&amp;#039;: A hash function formerly called &amp;#039;&amp;#039;[[SHA-3|Keccak]]&amp;#039;&amp;#039;, chosen in 2012 after a public competition among non-NSA designers. It supports the same hash lengths as SHA-2, and its internal structure differs significantly from the rest of the SHA family.&lt;br /&gt;
&lt;br /&gt;
The corresponding standards are [[Federal Information Processing Standard|FIPS]] PUB 180 (original SHA), FIPS PUB 180-1 (SHA-1), FIPS PUB 180-2 (SHA-1, SHA-256, SHA-384, and SHA-512). NIST has updated Draft FIPS Publication 202, SHA-3 Standard separate from the Secure Hash Standard (SHS).&lt;br /&gt;
&lt;br /&gt;
==Comparison of SHA functions==&lt;br /&gt;
In the table below, &amp;#039;&amp;#039;internal state&amp;#039;&amp;#039; means the &amp;quot;internal hash sum&amp;quot; after each compression of a data block.&lt;br /&gt;
{{Further|Merkle–Damgård construction}}&lt;br /&gt;
&lt;br /&gt;
{{Comparison of SHA functions}}&lt;br /&gt;
&lt;br /&gt;
== Validation ==&lt;br /&gt;
{{Main article|Cryptographic Module Validation Program}}&lt;br /&gt;
&lt;br /&gt;
All SHA-family  algorithms, as FIPS-approved security functions, are subject to official validation by the [[Cryptographic Module Validation Program|CMVP]] (Cryptographic Module Validation Program), a joint program  run by the  American [[National Institute of Standards and Technology]] (NIST) and the Canadian [[Communications Security Establishment]] (CSE).&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
{{Cryptography hash}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptography]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Dimawik</name></author>
	</entry>
</feed>