About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 53. Chapters: SHA-1, MD5, RIPEMD, Collision, Random oracle, Cryptographic hash function, One-way compression function, SHA-2, NIST hash function competition, Universal hashing, Fast Syndrome Based Hash, GOST, VEST, Very smooth hash, SWIFFT, Merkle-Damgard construction, Provably secure cryptographic hash function, Elliptic curve only hash, LM hash, Comparison of file verification software, Comparison of cryptographic hash functions, Whirlpool, Keccak, MD2, Tiger, Hash tree, MD4, Hash function security summary, RadioGatun, Skein, BLAKE, MD6, MDC-2, Md5sum, Grostl, Hash list, Examples of SHA digests, SMASH, Universal one-way hash function, JH, HAVAL, Sha1sum, SANDstorm hash, N-Hash, FORK-256, MASH-1, HAS-V, Quantum fingerprinting, HAS-160. Excerpt: In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The three SHA algorithms are structured differently and are distinguished as SHA-0, SHA-1, and SHA-2. SHA-1 is very similar to SHA-0, but corrects an error in the original SHA hash specification that led to significant weaknesses. The SHA-0 algorithm was not adopted by many applications. SHA-2 on the other hand significantly differs from the SHA-1 hash function. SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely-used security applications and protocols. In 2005, security flaws were identified in SHA-1, namely that a mathematical weakness might exist, indicating that a stronger hash function would be desirable. Although no successful attacks have yet been reported on the SHA-2 variants, they are algorithmically similar to SHA-1 and so efforts are underway to develop improved alternatives. A new hash standard, SHA-3, is currently unde...