Statements (119)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:currency
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:Federal_Information_Processing_Standards_Publication_186
|
gptkbp:designed_by |
gptkb:National_Security_Agency
|
gptkbp:developed_by |
gptkb:National_Security_Agency
|
gptkbp:has_programs |
gptkb:SHA-224
gptkb:SHA-384 gptkb:SHA-256 gptkb:SHA-512 gptkb:currency |
https://www.w3.org/2000/01/rdf-schema#label |
SHA-2
|
gptkbp:impact |
strong
|
gptkbp:includes |
gptkb:SHA-224
gptkb:SHA-384 gptkb:SHA-256 gptkb:SHA-512 |
gptkbp:is_designed_for |
secure hashing
|
gptkbp:is_implemented_in |
various programming languages
|
gptkbp:is_part_of |
authentication processes
data encryption standards data security measures identity management systems secure communications secure data storage security audits penetration testing access control mechanisms business continuity plans cybersecurity measures risk management strategies data governance policies compliance regulations disaster recovery plans security awareness training cloud security solutions encryption algorithms incident response plans data protection strategies network security protocols digital identity verification secure software development IT security policies information security frameworks vulnerability management programs privacy protection measures Secure Hash Standard threat intelligence initiatives |
gptkbp:is_standardized_by |
gptkb:NIST
|
gptkbp:is_used_in |
gptkb:TLS/_SSL_protocols
gptkb:software_framework data integrity verification digital signatures digital forensics password hashing cryptographic applications certificate generation file integrity checks VP Ns |
gptkbp:is_vulnerable_to |
collision attacks
pre-image attacks length extension attacks second pre-image attacks |
gptkbp:part_of |
gptkb:SHA_family
|
gptkbp:predecessor |
gptkb:SHA-3
|
gptkbp:provides |
collision resistance
pre-image resistance second pre-image resistance |
gptkbp:published_by |
gptkb:2001
|
gptkbp:related_to |
gptkb:software
gptkb:currency cybersecurity data loss prevention data protection laws encryption risk management application security cloud security data privacy data security identity verification incident response network security secure communications security audits security best practices security policies secure transactions threat intelligence web security penetration testing compliance standards information security endpoint security digital forensics security awareness training digital rights management security frameworks data authentication secure coding practices mobile security secure software development Io T security |
gptkbp:resolution |
256 bits
384 bits 224 bits 512 bits |
gptkbp:security_features |
gptkb:theorem
high |
gptkbp:speed |
gptkb:SHA-1
M D5 |
gptkbp:successor |
gptkb:SHA-1
|
gptkbp:suitable_for |
cryptography experts
|
gptkbp:used_in |
gptkb:software_framework
data integrity verification digital signatures password hashing certificate generation file integrity checks |
gptkbp:water_resistance |
strong
|