CAVP Testing: Secure Hashing
Algorithm specifications for current FIPS-approved and NIST-recommended secure hashing algorithms are available from the Cryptographic Toolkit.
Current testing includes the following algorithms:
Algorithm Validation Testing Requirements
FIPS 202, "SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions"
Secure Hash Algorithm-3 Validation System (SHA3VS) specifies validation testing requirements for the SHA3 family of functions in FIPS 202.
Secure Hash Algorithm
Secure Hash Standard Validation System (SHAVS) specifies validation testing requirements for the SHA-1 and SHA-2 family of functions in FIPS 180-4.
Secure hashing implementations validated by NIST are found on the SHS and SHA-3 Validation Lists:
Use of these test vectors does not replace validation obtained through the CAVP.
The test vectors linked below can be used to informally verify the correctness of secure hash algorithm implementations (in FIPS 180-4 and FIPS 202) using the validation systems listed above.
Response files (.rsp): the test vectors are properly formatted in response (.rsp) files. Vendor response files must match this format exactly.
Intermediate results files (.txt): files with intermediate results (.txt) are supplied to help with debugging.
See the README file in each zip file for details.