Statements (50)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
|
gptkbp:designed_for |
data integrity
data authentication |
gptkbp:developed_by |
gptkb:National_Security_Agency
|
gptkbp:first_published |
gptkb:1993
|
https://www.w3.org/2000/01/rdf-schema#label |
SHA family
|
gptkbp:impact |
varies by version
|
gptkbp:includes |
gptkb:SHA-0
gptkb:SHA-1 gptkb:SHA-3 gptkb:SHA-2 |
gptkbp:is_adopted_by |
gptkb:NIST
gptkb:ISO gptkb:IETF |
gptkbp:is_vulnerable_to |
SHA-1 has known vulnerabilities
SHA-2 is considered secure SHA-3 is considered secure |
gptkbp:preimage_resistance |
varies by version
|
gptkbp:related_to |
gptkb:Whirlpool
gptkb:RIPEMD gptkb:BLAKE2 gptkb:MD5 |
gptkbp:second_preimage_resistance |
varies by version
|
gptkbp:security |
varies by version
|
gptkbp:sha-1 |
deprecated
produces a 160-bit hash value |
gptkbp:sha-2 |
includes SHA-224
includes SHA-256 includes SHA-384 includes SHA-512 |
gptkbp:sha-256 |
produces a 256-bit hash value
|
gptkbp:sha-3 |
based on Keccak
produces variable-length hash values standardized in 2015 |
gptkbp:sha-512 |
produces a 512-bit hash value
|
gptkbp:used_in |
gptkb:blockchain_technology
gptkb:TLS/_SSL gptkb:cloud_storage gptkb:Software_Development digital signatures secure communications version control systems cryptographic protocols digital forensics password hashing file verification message integrity checks |
gptkbp:bfsParent |
gptkb:SHA-1
gptkb:SHA-2 |
gptkbp:bfsLayer |
6
|