SHA (Secure Hash Algorithm)

GPTKB entity

Statements (52)
Predicate Object
gptkbp:instanceOf hash function
gptkbp:application gptkb:cryptocurrency
digital signatures
message integrity
password hashing
gptkbp:category computer security
cryptography
gptkbp:competition gptkb:NIST_hash_function_competition
gptkbp:developedBy gptkb:National_Security_Agency
gptkbp:firstPublished 1993
gptkbp:hasVersion gptkb:SHA-2
gptkb:SHA-3
gptkb:SHA-1
gptkb:SHA-0
https://www.w3.org/2000/01/rdf-schema#label SHA (Secure Hash Algorithm)
gptkbp:length varies by version
gptkbp:publishedBy gptkb:National_Institute_of_Standards_and_Technology
gptkbp:relatedStandard gptkb:FIPS_PUB_180-4
gptkb:FIPS_PUB_180-1
gptkb:FIPS_PUB_180-3
gptkb:FIPS_PUB_180-2
gptkbp:replacedBy gptkb:SHA-2
gptkb:SHA-3
gptkbp:SHA-0_hashLength 160 bits
gptkbp:SHA-0_published 1993
gptkbp:SHA-0_status withdrawn
gptkbp:SHA-1_hashLength 160 bits
gptkbp:SHA-1_published 1995
gptkbp:SHA-1_status deprecated
gptkbp:SHA-1_vulnerability collision resistance broken
gptkbp:SHA-2_hashLength 224, 256, 384, 512 bits
gptkbp:SHA-2_published 2001
gptkbp:SHA-2_status recommended
gptkbp:SHA-2_vulnerability no practical attacks as of 2024
gptkbp:SHA-3_hashLength 224, 256, 384, 512 bits
gptkbp:SHA-3_published 2015
gptkbp:SHA-3_selectedFrom gptkb:Keccak
gptkbp:SHA-3_status recommended
gptkbp:SHA-3_vulnerability no practical attacks as of 2024
gptkbp:standardizedBy gptkb:FIPS_PUB_180
gptkbp:successor gptkb:SHA-2
gptkb:SHA-3
gptkb:SHA-1
gptkbp:usedIn gptkb:Bitcoin
gptkb:Git
gptkb:PGP
gptkb:SSL
TLS
gptkbp:vulnerableTo SHA-1 collision attacks
gptkbp:bfsParent gptkb:United_States_National_Security_Agency_(NSA)
gptkb:NIST_(collaborator)
gptkbp:bfsLayer 8