翻訳と辞書
Words near each other
・ Secure Digital Music Initiative
・ Secure DTD2000 System
・ Secure electronic delivery service
・ Secure Electronic Network for Travelers Rapid Inspection
・ Secure Electronic Registration and Voting Experiment
・ Secure Electronic Transaction
・ Secure end node
・ Secure environment
・ Secure Federal File Sharing Act
・ Secure Fence Act of 2006
・ Secure file transfer program
・ Secure file transfer protocol
・ Secure Flight
・ Secure Freight Initiative
・ Secure FTP (software)
Secure Hash Algorithm
・ Secure Hash Standard
・ Secure Hypertext Transfer Protocol
・ Secure input and output handling
・ Secure instant messaging
・ Secure Islands
・ Secure key issuing cryptography
・ Secure messaging
・ Secure Mobile Architecture
・ Secure Mobile Payment Service
・ Secure multi-party computation
・ Secure multicast
・ Secure Neighbor Discovery
・ Secure Network
・ Secure operating system


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Secure Hash Algorithm : ウィキペディア英語版
Secure Hash Algorithm
The Secure Hash Algorithm is a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including:
*SHA-0: A retronym applied to the original version of the 160-bit hash function published in 1993 under the name "SHA". It was withdrawn shortly after publication due to an undisclosed "significant flaw" and replaced by the slightly revised version SHA-1.
*SHA-1: A 160-bit hash function which resembles the earlier MD5 algorithm. This was designed by the National Security Agency (NSA) to be part of the Digital Signature Algorithm. Cryptographic weaknesses were discovered in SHA-1, and the standard was no longer approved for most cryptographic uses after 2010.
*SHA-2: A family of two similar hash functions, with different block sizes, known as ''SHA-256'' and ''SHA-512''. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are also truncated versions of each standard, known as ''SHA-224'', ''SHA-384'', ''SHA-512/224'' and ''SHA-512/256''. These were also designed by the NSA.
*SHA-3: A hash function formerly called ''Keccak'', chosen in 2012 after a public competition among non-NSA designers. It supports the same hash lengths as SHA-2, and its internal structure differs significantly from the rest of the SHA family.
The corresponding standards are FIPS PUB 180 (original SHA), FIPS PUB 180-1 (SHA-1), FIPS PUB 180-2 (SHA-1, SHA-256, SHA-384, and SHA-512). NIST has updated Draft FIPS Publication 202, SHA-3 Standard separate from the Secure Hash Standard (SHS).
==Comparison of SHA functions==
In the table below, ''internal state'' means the "internal hash sum" after each compression of a data block.


抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Secure Hash Algorithm」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.