Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

ITL Bulletin September 2015

Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection

Date Published: September 2015

Author(s)

Morris Dworkin (NIST), Larry Feldman (G2), Gregory Witte (G2)

Abstract

Keywords

computer security; cryptography; extendable-output function; Federal Information Processing Standard; hash algorithm; hash function; information security; KECCAK; message digest; permutation; SHA-3; sponge construction; sponge function; XOF
Control Families

System and Communications Protection; System and Information Integrity;

Documentation

Publication:
September 2015 ITL Bulletin

Supplemental Material:
None available

Topics

Security and Privacy
authentication; digital signatures