This is a potential security issue, you are being redirected to https://csrc.nist.gov
Algorithm specifications for current FIPS-approved and NIST-recommended secure hashing algorithms are available from the Cryptographic Toolkit.
Current testing includes the following algorithms:
Secure Hash Algorithm-3 Validation System (SHA3VS) specifies validation testing requirements for the SHA3 family of functions in FIPS 202.
Secure Hash Standard Validation System (SHAVS) specifies validation testing requirements for the SHA-1 and SHA-2 family of functions in FIPS 180-4.
Use of these test vectors does not replace validation obtained through the CAVP.
The test vectors linked below can be used to informally verify the correctness of secure hash algorithm implementations (in FIPS 180-4 and FIPS 202) using the validation systems listed above.
Response files (.rsp): the test vectors are properly formatted in response (.rsp) files. Vendor response files must match this format exactly.
Intermediate results files (.txt): files with intermediate results (.txt) are supplied to help with debugging.
See the README file in each zip file for details.
|Publication||Algorithm Test Vectors|