SHA
Jump to navigation
Jump to search
wikipedia:Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS).
- SHA-256
- SHA-3 (2015): SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512
- wikipedia:SHA-2 (2001)
- wikipedia:SHA-1 (1995), 160-bit hash function. Deprecated.
- SHA-0 (1993)
ssh-rsa public key signature algorithm depends
on SHA-1
Related terms[edit]
See also[edit]
- RMD160, TIGER, CRC32, HAVAL, GOST
- SHA-0, SHA-1, SHA-2, SHA-3,
sha1sum, sha256sum, sha512sum
- MD5,
md5sum, bcrypt
, CRAM-MD5, SHA - Cypher: MD5, SHA, Bcrypt, Blowfish
- Public-key cryptography: RSA, DSA, ECDSA, EdDSA (Ed25519), AES, RSA Conference, hash,
pkeyutl
- OpenSSH (changelog),
/etc/ssh/sshd_config
,/etc/ssh/ssh_config
,~/.ssh/
,openSSL, sshd logs
,sftp
,scp
,authorized_keys
,ssh-keyscan
,ssh-add
,ssh-keygen
,ssh
,Ssh -O stop
- NIST, SHA, AES, DSA, FIPS