What is a safe hash algorithm?

HAS A HASH algorithm, also known as SHA, is a hash algorithm that is considered to be cryptographically safe. Original data, once hash with secured hash algorithm, cannot usually be reconstructed with a feasible amount of computing power. HAS HASTMY ALGORITMY is often used in combination with other algorithms to verify messages, including digital signatures.

Some network routers and firewalls implement secure hash algorithms directly into the hardware. This allows you to verify data packets with a limited impact on permeability. There is also software for securing algorithm hash, including many open source implementations. The US National Institute for Standards and Technologies (NIST) and Canadian Communication (CSE) (CSE) together operate the program of verification of the cryptographic module (CMVP). This official program confirms the proper functioning of the secure hash algorithm for sensitive applications.

American government standardiHe has won at least six secured hash algorithms. SHA-0 and SHA-1 were the oldest incarnations developed in the 90's. The Sha -2 series developed in 2000, included SHA -224, -256, -384 and -512. They are designed to create two unique sets of has has hash of different content and avoids hash collisions.

The Sha-0 algorithm, for the first time published in 1993, was quickly found after the detection of significant weakness. It was replaced by SHA-1 in 1995, which includes another computing step that solves the unpublished SHA-0 problems. Both algorithms Hash Message up to 2

64 -1 bits into 160 -bit "digestics". Both use the size of the block 512 bits and the size of the word 32 bits during their operation.

SHA-1 is used in some common internet protocols and security tools. These include IPSEC, PGP, SSL, S/MIME, SSH and TLS.SHA-1 are also usually used as part of the systemProtection for unclassified government documents. The private sector uses this secure hash algorithm for some sensitive information. In 2010, it is planned for a retirement from the general use of the government.

SHA -224, -256, -384 and -512 were published by Nist between 2001 and 2004. These four algorithms, also known as the SHA -2 family, are generally more robust than SHA -1. SHA-224 and SHA-256 use the same block, word and maximum input size as SHA-1. On the other hand, the SHA-224 produces 224-bit digesting, while the SHA-256 produces 256-bit diges. SHA-384 and SHA-512 increase the size of the block to 1024 bits, the size of the word to 64 bits and the maximum length of the input message to 2

128

-1 bits. The SHA-384 overview is 384 bits, while The Sha-512 Digest contains 512 bits.

Like Sha-0 and SHA-1, the Sha-2 family was designed by the US National Security Agency (NSA). Although serious shortcomings are not publicly published in SHA-2 and launched a competition for the development of anotherSafe Hash Algorithm. This new algorithm, which is to be called SHA-3, is likely to be selected in 2012 from a collection of public contributions. It is expected to be a new design, not based on existing algorithms.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?