GPTKB
Browse
Query
Compare
Download
Publications
Contributors
Search
SHA (Secure Hash Algorithm)
URI:
https://gptkb.org/entity/SHA_(Secure_Hash_Algorithm)
GPTKB entity
Statements (52)
Predicate
Object
gptkbp:instanceOf
hash function
gptkbp:application
gptkb:cryptocurrency
digital signatures
message integrity
password hashing
gptkbp:category
computer security
cryptography
gptkbp:competition
gptkb:NIST_hash_function_competition
gptkbp:developedBy
gptkb:National_Security_Agency
gptkbp:firstPublished
1993
gptkbp:hasVersion
gptkb:SHA-2
gptkb:SHA-3
gptkb:SHA-1
gptkb:SHA-0
https://www.w3.org/2000/01/rdf-schema#label
SHA (Secure Hash Algorithm)
gptkbp:length
varies by version
gptkbp:publishedBy
gptkb:National_Institute_of_Standards_and_Technology
gptkbp:relatedStandard
gptkb:FIPS_PUB_180-4
gptkb:FIPS_PUB_180-1
gptkb:FIPS_PUB_180-3
gptkb:FIPS_PUB_180-2
gptkbp:replacedBy
gptkb:SHA-2
gptkb:SHA-3
gptkbp:SHA-0_hashLength
160 bits
gptkbp:SHA-0_published
1993
gptkbp:SHA-0_status
withdrawn
gptkbp:SHA-1_hashLength
160 bits
gptkbp:SHA-1_published
1995
gptkbp:SHA-1_status
deprecated
gptkbp:SHA-1_vulnerability
collision resistance broken
gptkbp:SHA-2_hashLength
224, 256, 384, 512 bits
gptkbp:SHA-2_published
2001
gptkbp:SHA-2_status
recommended
gptkbp:SHA-2_vulnerability
no practical attacks as of 2024
gptkbp:SHA-3_hashLength
224, 256, 384, 512 bits
gptkbp:SHA-3_published
2015
gptkbp:SHA-3_selectedFrom
gptkb:Keccak
gptkbp:SHA-3_status
recommended
gptkbp:SHA-3_vulnerability
no practical attacks as of 2024
gptkbp:standardizedBy
gptkb:FIPS_PUB_180
gptkbp:successor
gptkb:SHA-2
gptkb:SHA-3
gptkb:SHA-1
gptkbp:usedIn
gptkb:Bitcoin
gptkb:Git
gptkb:PGP
gptkb:SSL
TLS
gptkbp:vulnerableTo
SHA-1 collision attacks
gptkbp:bfsParent
gptkb:United_States_National_Security_Agency_(NSA)
gptkb:NIST_(collaborator)
gptkbp:bfsLayer
8