Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-107 Rev. 1

Recommendation for Applications Using Approved Hash Algorithms

Date Published: August 2012

Supersedes: SP 800-107 (February 2009)

Author(s)

Quynh Dang (NIST)

Abstract

Keywords

Digital signatures; hash algorithms; cryptographic hash function; hash function; hash-based key derivation algorithms; hash value; HMAC; message digest; randomized hashing; random number generation; SHA; truncated hash values.
Control Families

Identification and Authentication; System and Communications Protection; System and Information Integrity;

Documentation

Publication:
SP 800-107 Rev. 1 (DOI)
Local Download

Supplemental Material:
None available