SHA family

GPTKB entity

Statements (49)
Predicate Object
gptkbp:instance_of gptkb:currency
gptkbp:bfsLayer 4
gptkbp:bfsParent gptkb:SHA-1
gptkb:SHA-2
gptkbp:developed_by gptkb:National_Security_Agency
gptkbp:first_published gptkb:1993
https://www.w3.org/2000/01/rdf-schema#label SHA family
gptkbp:impact varies by version
gptkbp:includes gptkb:SHA-0
gptkb:SHA-1
gptkb:SHA-3
gptkb:SHA-2
gptkbp:is_adopted_by gptkb:NIST
gptkb:ISO
gptkb:IETF
gptkbp:is_designed_for data integrity
data authentication
gptkbp:is_vulnerable_to SHA-1 has known vulnerabilities
SHA-2 is considered secure
SHA-3 is considered secure
gptkbp:iso639-3 based on Keccak
produces a 256-bit hash value
produces a 512-bit hash value
produces variable-length hash values
standardized in 2015
gptkbp:number deprecated
produces a 160-bit hash value
gptkbp:related_to gptkb:Whirlpool
gptkb:RIPEMD
M D5
BLAK E2
gptkbp:security_features varies by version
gptkbp:sequel includes SHA-224
includes SHA-256
includes SHA-384
includes SHA-512
gptkbp:used_in gptkb:software_framework
gptkb:TLS/_SSL
gptkb:Cloud_Computing_Service
gptkb:computer
digital signatures
secure communications
version control systems
cryptographic protocols
digital forensics
password hashing
file verification
message integrity checks
gptkbp:water_resistance varies by version