Secure Hash Algorithm


Also found in: Acronyms, Wikipedia.

Secure Hash Algorithm

(algorithm, cryptography)
(SHA) A one-way hash function developped by NIST and defined in standard FIPS 180. SHA-1 is a revision published in 1994; it is also described in ANSI standard X9.30 (part 2).
Mentioned in ?
References in periodicals archive ?
Mahboob, "Efficient FPGA Implementation of Secure Hash Algorithm Grestl--SHA-3 Finalist," In Emerging Trends and Applications in Information Communication Technologies, vol.
Furthermore, the Suite B Hardware Security Power Bundle implements ECC-based algorithms for digital signature and key exchange, in addition to secure hash algorithm for hashing and advanced encryption standard for encryption.
STMicroelectronics, a global semiconductor leader serving customers across the spectrum of electronics applications, congratulates three cryptography experts from its Secure Microcontroller Division and Advanced System Technology Group for winning an international competition to develop a new global industry standard for digital security the Secure Hash Algorithm SHA-3.
NIST, Federal Information Processing Standard 180, Secure Hash Algorithm, 1995.
Unlike other RFID solutions that leverage proprietary cryptography, ReaderWare Security implements open standards-based versions of the Advanced Encryption Standard (AES) and Secure Hash Algorithm (SHA) for state-of-the-art encryption and hashing.
The security processing unit provides hardware acceleration for the DES, 3DES, Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA-1) and MD-5 algorithms.
AURA also encompasses the Secure Hash Algorithm (SHA) and MD5 to provide industrial strength hashing to protect against tag tampering and counterfeiting.
Elements of Suite B include: -- Encryption Advanced Encryption Standard (AES) - FIPS 197 -- Digital Signature Elliptic Curve Digital Signature Algorithm - FIPS 186-2 -- Key Exchange Elliptic Curve Diffie-Hellman or Elliptic Curve MQV - Draft NIST Special Publication 800-56 -- Hashing Secure Hash Algorithm - FIPS 180-2
PGP Corporation, a global leader in enterprise encryption solutions, today announced it is planning to migrate to a more secure version of the Secure Hash Algorithm (SHA) in the upcoming releases of its PGP(R) Desktop and PGP(R) Universal encryption solutions.
509 v3 certificates and the Secure Hash Algorithm (SHA-1), as well as Diffie-Hellman and Internet Key Exchange (IKE) protocols to perform authentication and automatic exchange of key material.

Full browser ?