Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

secure hash algorithm (SHA)

Abbreviation(s) and Synonym(s): Definition(s):

  Secure Hash Algorithm.
Source(s):
NIST SP 800-56B Rev. 1 under SHA

  A hash algorithm with the property that it is computationally infeasible 1) to find a message that corresponds to a given message digest, or 2) to find two different messages that produce the same message digest.
Source(s):
CNSSI 4009-2015 (FIPS 180-4 - Adapted)

  A hash function specified in FIPS 180-2, the Secure Hash Standard.
Source(s):
NIST SP 800-89 under SHA-1

  The Secure Hash Algorithm defined in Federal Information Processing Standard 180-1.
Source(s):
NIST SP 800-22 Rev. 1a under SHA-1

  The SHA-1 hash for the resource.
Source(s):
NIST SP 800-70 Rev. 3 under SHA-1 [Superseded]