SP 800-107. Recommendation for Applications Using Approved Hash Algorithms

  • Authors:
  • Quynh H. Dang

  • Affiliations:
  • National Institute of Standards and Technology

  • Venue:
  • SP 800-107. Recommendation for Applications Using Approved Hash Algorithms
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cryptographic hash functions that compute a fixed- length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved cryptographic hash functions specified in Federal Information Processing Standard (FIPS) 180-3. These include functions such as digital signature applications, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (HKDFs).