SHA-2
From Just Solve the File Format Problem
(Difference between revisions)
(PRONOM) |
|||
(7 intermediate revisions by 2 users not shown) | |||
Line 2: | Line 2: | ||
|subcat=Encryption | |subcat=Encryption | ||
|released=2002 | |released=2002 | ||
+ | |pronom={{PRONOM|fmt/991}} | ||
}} | }} | ||
− | + | '''SHA-2''' is a family of cryptographic hash functions. | |
− | '''SHA-2''' is a family of cryptographic hash functions | + | |
− | == | + | == Details == |
− | + | As of 2012, SHA-2 has six defined-and-approved members, which can be classified into two sub-families. | |
− | + | ||
− | + | * SHA-2 family | |
− | * '''SHA-512/224''' (224-bit) | + | ** SHA-256 sub-family |
− | * '''SHA-512/256''' (256-bit) | + | *** '''SHA-224''' (224-bit) |
− | * '''SHA-384''' (384-bit) | + | *** '''SHA-256''' (256-bit) |
− | * '''SHA-512''' (512-bit) | + | ** SHA-512 sub-family |
+ | *** '''SHA-512/224''' (224-bit) | ||
+ | *** '''SHA-512/256''' (256-bit) | ||
+ | *** '''SHA-384''' (384-bit) | ||
+ | *** '''SHA-512''' (512-bit) | ||
− | The specification also defines ''t''-bit hashes named SHA-512/''t'', for a wide range of values of ''t'', but it only approves SHA-512/224 and SHA-512/256 for use. | + | The specification also defines ''t''-bit hashes named SHA-512/''t'', for a wide range of values of ''t'', but it only approves the aforementioned SHA-512/224 and SHA-512/256 for use. |
== Specifications == | == Specifications == | ||
Line 24: | Line 27: | ||
== Software == | == Software == | ||
− | * [ | + | * [[OpenSSL]] (<code>openssl dgst [-sha224|-sha256|-sha384|-sha512]</code>) |
+ | * [http://www.gnu.org/software/coreutils/ GNU coreutils] → [http://www.gnu.org/software/coreutils/manual/html_node/sha2-utilities.html sha224sum, sha256sum, sha384sum, sha512sum] | ||
+ | |||
+ | == See also == | ||
+ | * [[SHA-1]] (predecessor) | ||
+ | * [[SHA-3]] (successor) | ||
== Links == | == Links == | ||
* [[Wikipedia:SHA-2|Wikipedia article]] | * [[Wikipedia:SHA-2|Wikipedia article]] | ||
+ | * [http://eprint.iacr.org/2010/548 SHA-512/256] - 2010 report by Gueron, Johnson, Walker | ||
+ | * [http://hackaday.com/2014/12/19/nist-randomness-beacon/ Towards the Perfect Coin Flip: The NIST Randomness Beacon] (uses SHA512) | ||
[[Category:Error detection and correction]] | [[Category:Error detection and correction]] |
Latest revision as of 18:49, 25 March 2017
SHA-2 is a family of cryptographic hash functions.
Contents |
[edit] Details
As of 2012, SHA-2 has six defined-and-approved members, which can be classified into two sub-families.
- SHA-2 family
- SHA-256 sub-family
- SHA-224 (224-bit)
- SHA-256 (256-bit)
- SHA-512 sub-family
- SHA-512/224 (224-bit)
- SHA-512/256 (256-bit)
- SHA-384 (384-bit)
- SHA-512 (512-bit)
- SHA-256 sub-family
The specification also defines t-bit hashes named SHA-512/t, for a wide range of values of t, but it only approves the aforementioned SHA-512/224 and SHA-512/256 for use.
[edit] Specifications
- FIPS PUB 180-2 (1 Aug. 2002): SHA-256, SHA-384, SHA-512
- FIPS PUB 180-3 (Oct. 2008): Adds SHA-224
- FIPS PUB 180-4 (Mar. 2012): Adds SHA-512/224, SHA-512/256
[edit] Software
- OpenSSL (
openssl dgst [-sha224|-sha256|-sha384|-sha512]
) - GNU coreutils → sha224sum, sha256sum, sha384sum, sha512sum
[edit] See also
[edit] Links
- Wikipedia article
- SHA-512/256 - 2010 report by Gueron, Johnson, Walker
- Towards the Perfect Coin Flip: The NIST Randomness Beacon (uses SHA512)