New Reduced price! ANSI X9.30.2 : 1997 View larger

ANSI X9.30.2 : 1997

M00011234

New product

ANSI X9.30.2 : 1997

PUBLIC KEY CRYPTOGRAPHY USING IRREVERSIBLE ALGORITHMS - PART 2: THE SECURE HASH ALGORITHM (SHA-1)

American Bankers Association

More details

In stock

$35.10

-55%

$78.00

More info

Table of Contents

FOREWORD
1. SCOPE
2. DEFINITIONS AND COMMON ABBREVIATIONS
   2.1. DEFINITIONS
   2.2. ABBREVIATIONS AND ACRONYMS AND OPERATIONS ON WORDS
        2.2.1. Abbreviations and Acronyms
        2.2.2. Operations On Words
   2.3. BIT STRINGS AND INTEGERS
3. THE SECURE HASH ALGORITHM (SHA-1)
   3.1. MESSAGE PADDING
   3.2. FUNCTIONS AND CONSTANTS USED
   3.3. COMPUTING THE MESSAGE DIGEST
   3.4. ALTERNATIVE METHOD OF COMPUTATION
   3.5. COMPARISON OF METHODS
   3.6. COMPUTATIONAL EXAMPLES
ANNEX A: FIRST SAMPLE MESSAGE AND ITS MESSAGE DIGEST
ANNEX B: A SECOND SAMPLE MESSAGE AND ITS MESSAGE DIGEST
ANNEX C: A THIRD SAMPLE MESSAGE AND ITS MESSAGE DIGEST
ANNEX D: THE 1994 VERSION OF THE SHA
      D.1. INTRODUCTION
      D.2. COMPUTING THE MESSAGE DIGEST
      D.3. ALTERNATIVE METHOD OF COMPUTATION
      D.4. COMPARISON OF METHODS
      D.5. COMPUTATIONAL EXAMPLES
           D.5.1. FIRST SAMPLE MESSAGE AND ITS MESSAGE DIGEST
           D.5.2. A SECOND SAMPLE MESSAGE AND ITS MESSAGE
                  DIGEST
           D.5.3. A THIRD SAMPLE MESSAGE AND ITS MESSAGE
                  DIGEST

Abstract

The Secure Hash Algorithm (SHA-1) is required for use with the Digital Signature Algorithm and may be used whenever a secure hash algorithm is required.

General Product Information

Document Type Standard
Status Current
Publisher American Bankers Association
Committee X9