Hash Functions
News and Updates
Proposal to Update FIPS 202 and Revise SP 800-185
September 4, 2024
NIST's Crypto Publication Review Board is proposing to update FIPS 202, "SHA-3 Standard" and revise Special Publication 800-185, "SHA-3 Derived Functions." Submit public comments through Monday, October 7, 2024.
NIST Transitioning Away from SHA-1 for All Applications
December 15, 2022
NIST is introducing a plan to transition away from the current limited use of the Secure Hash Algorithm 1 (SHA-1) hash function. Other approved hash functions are already available. The transition will be completed by...
Public Comments Requested on FIPS 180-4
June 9, 2022
NIST is currently reviewing FIPS 180-4, "Secure Hash Standard (SHS)," (2015) and is requesting public feedback on all aspects of the publication by September 9, 2022.
Research Results on SHA-1 Collisions
February 24, 2017
On Thursday, February 23rd, Google announced that a team of researchers from the CWI Institute in Amsterdam and Google have successfully demonstrated an attack on the SHA-1 hash algorithm by creating two files that hash to...
NIST Announces the Release of NISTIR 7896
November 16, 2012
NIST opened a public "SHA-3" competition in November 2007 to develop a new cryptographic hash algorithm. On October 2, 2012, NIST announced Keccak as the winner and the new SHA-3 algorithm.
NIST and NISTs CSD Announced the SHA-3 WINNER
October 3, 2012
NIST announced KECCAK as the winner of the SHA-3 Cryptographic Hash Algorithm Competition and the new SHA-3 hash algorithm in a press release issued on October 2, 2012. KECCAK was designed by a team ...
Request for Candidate Algorithm Nominations
November 2, 2007
This notice solicits nominations from any interested party for candidate algorithms to be considered for SHA-3, and specifies how to submit a nomination package.
NIST Comments on Cryptanalytic Attacks on SHA-1
April 26, 2006
In 2005 Prof. Xiaoyun Wang announced a differential attack on the SHA-1 hash function. NIST found that the attack was practical, and announced plans for transitioning to SHA-2 algorithms and development of SHA-3.
NIST Brief Comments on Recent Cryptanalytic Attacks
August 25, 2004
Researchers have recently announced they have discovered a new way to break a number of cryptographic hash algorithms. Click here to read NIST's brief comments on recent cryptanalytic attacks on secure hashing functions and...
Project Links
Additional Pages
Created January 04, 2017, Updated September 09, 2024