Accession Number PB2012-114315
Title Recommendation for Applications Using Approved Hash Algorithms, Revision 1.
Publication Date Aug 2012
Media Count 25p
Personal Author Q. Dang
Abstract Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs).
Keywords Algorithms
Data cryptography
Data processing security
Hash functions
Random number generation

Source Agency National Institute of Standards and Technology
NTIS Subject Category 62 - Computers, Control & Information Theory
Corporate Author National Inst. of Standards and Technology (ITL), Gaithersburg, MD. Computer Security Div.
Document Type Technical report
Title Note N/A
NTIS Issue Number 1226
Contract Number N/A

Science and Technology Highlights

See a sampling of the latest scientific, technical and engineering information from NTIS in the NTIS Technical Reports Newsletter

Acrobat Reader Mobile    Acrobat Reader