X-Nico

7 unusual facts about Secure Hash Algorithm


CrushFTP Server

Encryption is supported for files "at rest" using PGP, as well as for passwords using an MD5 or SHA, SHA512, MD4 non-reversible hash.

EMV

The use of a PIN and cryptographic algorithms such as DES, Triple-DES, RSA and SHA provide authentication of the card to the processing terminal and the card issuer's host system.

IBM System z9

Other hardware-boosted features include additional random number generation and SHA algorithms.

Intel SHA extensions

Intel SHA Extensions are set of extensions to the x86 instruction set architecture which support hardware acceleration of Secure Hash Algorithm (SHA) family.

Key size

Mainstream symmetric ciphers (such as AES or Twofish) and collision resistant hash functions (such as SHA) are widely conjectured to offer greater security against known quantum computing attacks.

Password strength

Standard cryptographic hashes, such as the Secure Hash Algorithm series, are very hard to reverse, so an attacker who gets hold of the hash value cannot directly recover the password.

Randomness extractor

NIST Special Publication 800-90B (draft) recommends several extractors, including the SHA hash family and states that if the amount of entropy input is twice the number of bits output from them, that output can be considered essentially fully random.



see also

TSIG

RFC 4635 was circulated to allow RFC 3174 Secure Hash Algorithm (SHA1) hashing and FIPS PUB 180-2 SHA-2 hashing to replace MD5.