Documents in the NTIS Technical Reports collection are the results of federally funded research. They are directly submitted to or collected by NTIS from Federal agencies for permanent accessibility to industry, academia and the public.  Before purchasing from NTIS, you may want to check for free access from (1) the issuing organization's website; (2) the U.S. Government Printing Office's Federal Digital System website http://www.gpo.gov/fdsys; (3) the federal government Internet portal USA.gov; or (4) a web search conducted using a commercial search engine such as http://www.google.com.
Accession Number PB2012-114315
Title Recommendation for Applications Using Approved Hash Algorithms, Revision 1.
Publication Date Aug 2012
Media Count 25p
Personal Author Q. Dang
Abstract Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs).
Keywords Algorithms
Data cryptography
Data processing security
Guidelines
Hash functions
Random number generation

 
Source Agency National Institute of Standards and Technology
NTIS Subject Category 62 - Computers, Control & Information Theory
Corporate Author National Inst. of Standards and Technology (ITL), Gaithersburg, MD. Computer Security Div.
Document Type Technical report
Title Note N/A
NTIS Issue Number 1226
Contract Number N/A

Science and Technology Highlights

See a sampling of the latest scientific, technical and engineering information from NTIS in the NTIS Technical Reports Newsletter

Acrobat Reader Mobile    Acrobat Reader