Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
Secure Hash Algorithms
Family of cryptographic hash functions

The Secure Hash Algorithms (SHA) are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS). The family includes SHA-0, an early version withdrawn due to flaws; SHA-1, designed by the NSA but now deprecated due to cryptographic weaknesses; the robust SHA-2 suite with variants like SHA-256 and SHA-512; and SHA-3, formerly known as Keccak, selected through an open competition and differing structurally from earlier versions. These standards have evolved through various FIPS publications, reflecting advances in security requirements and cryptanalysis.

We don't have any images related to Secure Hash Algorithms yet.
We don't have any YouTube videos related to Secure Hash Algorithms yet.
We don't have any PDF documents related to Secure Hash Algorithms yet.
We don't have any Books related to Secure Hash Algorithms yet.
We don't have any archived web articles related to Secure Hash Algorithms yet.

Comparison of SHA functions

In the table below, internal state means the "internal hash sum" after each compression of a data block.

Further information: Merkle–Damgård construction

Comparison of SHA functions
  • view
  • talk
  • edit
Algorithm and variantOutput size(bits)Internal state size (bits)Block size(bits)RoundsOperationsSecurity against collision attacks (bits)Security against length extension attacks (bits)Performance on Skylake (median cpb)1First published
Long messages8 bytes
MD5 (as reference)128128(4 × 32)5124 (16 operations in each round)And, Xor, Or, Rot, Add (mod 232)≤ 18(collisions found)204.9955.001992
SHA-0160160(5 × 32)51280And, Xor, Or, Rot, Add (mod 232)< 34(collisions found)0≈ SHA-1≈ SHA-11993
SHA-1< 63(collisions found)33.4752.001995
SHA-2SHA-224SHA-256224256256(8 × 32)51264And, Xor, Or, Rot, Shr, Add (mod 232)112 12832 07.627.6384.5085.2520042001
SHA-384384512(8 × 64)102480And, Xor, Or, Rot, Shr, Add (mod 264)1921285.12135.752001
SHA-512512256045.06135.502001
SHA-512/224SHA-512/256224256112128288256≈ SHA-384≈ SHA-3842012
SHA-3SHA3-224SHA3-256SHA3-384SHA3-5122242563845121600(5 × 5 × 64)11521088832576245And, Xor, Rot, Not11212819225644851276810248.128.5911.0615.88154.25155.50164.00164.002015
SHAKE128SHAKE256d (arbitrary)d (arbitrary)13441088min(d/2, 128)min(d/2, 256)2565127.088.59155.25155.50

Validation

Main article: Cryptographic Module Validation Program

All SHA-family algorithms, as FIPS-approved security functions, are subject to official validation by the CMVP (Cryptographic Module Validation Program), a joint program run by the American National Institute of Standards and Technology (NIST) and the Canadian Communications Security Establishment (CSE).

References

  1. "Measurements table". bench.cr.yp.to. http://bench.cr.yp.to/results-hash.html#amd64-skylake

  2. Tao, Xie; Liu, Fanbao; Feng, Dengguo (2013). Fast Collision Attack on MD5 (PDF). Cryptology ePrint Archive (Technical report). IACR. https://eprint.iacr.org/2013/170.pdf

  3. Stevens, Marc; Bursztein, Elie; Karpman, Pierre; Albertini, Ange; Markov, Yarik. The first collision for full SHA-1 (PDF) (Technical report). Google Research. Marc Stevens; Elie Bursztein; Pierre Karpman; Ange Albertini; Yarik Markov; Alex Petit Bianco; Clement Baisse (February 23, 2017). "Announcing the first SHA1 collision". Google Security Blog. /wiki/Marc_Stevens_(cryptology)

  4. Without truncation, the full internal state of the hash function is known, regardless of collision resistance. If the output is truncated, the removed part of the state must be searched for and found before the hash function can be resumed, allowing the attack to proceed.

  5. "The Keccak sponge function family". Retrieved 2016-01-27. http://keccak.noekeon.org/specs_summary.html