Statements (49)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:currency
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:SHA-1
gptkb:SHA-2 |
gptkbp:developed_by |
gptkb:National_Security_Agency
|
gptkbp:first_published |
gptkb:1993
|
https://www.w3.org/2000/01/rdf-schema#label |
SHA family
|
gptkbp:impact |
varies by version
|
gptkbp:includes |
gptkb:SHA-0
gptkb:SHA-1 gptkb:SHA-3 gptkb:SHA-2 |
gptkbp:is_adopted_by |
gptkb:NIST
gptkb:ISO gptkb:IETF |
gptkbp:is_designed_for |
data integrity
data authentication |
gptkbp:is_vulnerable_to |
SHA-1 has known vulnerabilities
SHA-2 is considered secure SHA-3 is considered secure |
gptkbp:iso639-3 |
based on Keccak
produces a 256-bit hash value produces a 512-bit hash value produces variable-length hash values standardized in 2015 |
gptkbp:number |
deprecated
produces a 160-bit hash value |
gptkbp:related_to |
gptkb:Whirlpool
gptkb:RIPEMD M D5 BLAK E2 |
gptkbp:security_features |
varies by version
|
gptkbp:sequel |
includes SHA-224
includes SHA-256 includes SHA-384 includes SHA-512 |
gptkbp:used_in |
gptkb:software_framework
gptkb:TLS/_SSL gptkb:Cloud_Computing_Service gptkb:computer digital signatures secure communications version control systems cryptographic protocols digital forensics password hashing file verification message integrity checks |
gptkbp:water_resistance |
varies by version
|