Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Secure Hash Algorithms

From Wikipedia, the free encyclopedia
Family of cryptographic hash functions

TheSecure Hash Algorithms are a family ofcryptographic hash functions published by theNational Institute of Standards and Technology (NIST) as aU.S.Federal Information Processing Standard (FIPS), including:

  • SHA-0: Aretronym applied to the original version of the 160-bit hash function published in 1993 under the name "SHA". It was withdrawn shortly after publication due to an undisclosed "significant flaw" and replaced by the slightly revised version SHA-1.
  • SHA-1: A 160-bit hash function which resembles the earlierMD5 algorithm. This was designed by theNational Security Agency (NSA) to be part of theDigital Signature Algorithm. Cryptographic weaknesses were discovered in SHA-1, and the standard was no longer approved for most cryptographic uses after 2010.
  • SHA-2: A family of two similar hash functions, with different block sizes, known asSHA-256 andSHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are also truncated versions of each standard, known asSHA-224,SHA-384,SHA-512/224 andSHA-512/256. These were also designed by the NSA.
  • SHA-3: A hash function formerly calledKeccak, chosen in 2012 after a public competition among non-NSA designers. It supports the same hash lengths as SHA-2, and its internal structure differs significantly from the rest of the SHA family.

The corresponding standards areFIPS PUB 180 (original SHA), FIPS PUB 180-1 (SHA-1), FIPS PUB 180-2 (SHA-1, SHA-256, SHA-384, and SHA-512). NIST has updated Draft FIPS Publication 202, SHA-3 Standard separate from the Secure Hash Standard (SHS).

Comparison of SHA functions

[edit]

In the table below,internal state means the "internal hash sum" after each compression of a data block.

Further information:Merkle–Damgård construction
Comparison of SHA functions
Algorithm and variantOutput size
(bits)
Internal
state size
(bits)
Block size
(bits)
RoundsOperationsSecurity
(bits)
Performance onSkylake (mediancpb)[1]First published
Long messages8 bytes
MD5 (as reference)128128
(4 × 32)
5124
(16 operations in each round)
And, Xor, Or, Rot,Add (mod 232)≤ 18
(collisions found)[2]
4.9955.001992
SHA-0160160
(5 × 32)
51280And, Xor, Or, Rot,Add (mod 232)< 34
(collisions found)
≈ SHA-1≈ SHA-11993
SHA-1< 63
(collisions found)[3]
3.4752.001995
SHA-2SHA-224
SHA-256
224
256
256
(8 × 32)
51264And, Xor, Or,
Rot, Shr,Add (mod 232)
112
128
7.62
7.63
84.50
85.25
2004
2001
SHA-384384512
(8 × 64)
102480And, Xor, Or,
Rot, Shr,Add (mod 264)
1925.12135.752001
SHA-5125122565.06135.502001
SHA-512/224
SHA-512/256
224
256
112
128
≈ SHA-384≈ SHA-3842012
SHA-3SHA3-224
SHA3-256
SHA3-384
SHA3-512
224
256
384
512
1600
(5 × 5 × 64)
1152
1088
832
576
24[4]And, Xor, Rot, Not112
128
192
256
8.12
8.59
11.06
15.88
154.25
155.50
164.00
164.00
2015
SHAKE128
SHAKE256
d (arbitrary)
d (arbitrary)
1344
1088
min(d/2, 128)
min(d/2, 256)
7.08
8.59
155.25
155.50

Validation

[edit]
Main article:Cryptographic Module Validation Program

All SHA-family algorithms, as FIPS-approved security functions, are subject to official validation by theCMVP (Cryptographic Module Validation Program), a joint program run by the AmericanNational Institute of Standards and Technology (NIST) and the CanadianCommunications Security Establishment (CSE).

References

[edit]
  1. ^"Measurements table".bench.cr.yp.to.
  2. ^Tao, Xie; Liu, Fanbao; Feng, Dengguo (2013).Fast Collision Attack on MD5(PDF).Cryptology ePrint Archive (Technical report).IACR.
  3. ^Stevens, Marc;Bursztein, Elie; Karpman, Pierre; Albertini, Ange; Markov, Yarik.The first collision for full SHA-1(PDF) (Technical report).Google Research.
    • Marc Stevens; Elie Bursztein; Pierre Karpman; Ange Albertini; Yarik Markov; Alex Petit Bianco; Clement Baisse (February 23, 2017)."Announcing the first SHA1 collision".Google Security Blog.
  4. ^"The Keccak sponge function family". Retrieved2016-01-27.
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
Retrieved from "https://en.wikipedia.org/w/index.php?title=Secure_Hash_Algorithms&oldid=1324751853"
Category:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp