M00011234
New product
PUBLIC KEY CRYPTOGRAPHY USING IRREVERSIBLE ALGORITHMS - PART 2: THE SECURE HASH ALGORITHM (SHA-1)
American Bankers Association
In stock
Warning: Last items in stock!
Availability date: 11/04/2021
FOREWORD
1. SCOPE
2. DEFINITIONS AND COMMON ABBREVIATIONS
2.1. DEFINITIONS
2.2. ABBREVIATIONS AND ACRONYMS AND OPERATIONS ON WORDS
2.2.1. Abbreviations and Acronyms
2.2.2. Operations On Words
2.3. BIT STRINGS AND INTEGERS
3. THE SECURE HASH ALGORITHM (SHA-1)
3.1. MESSAGE PADDING
3.2. FUNCTIONS AND CONSTANTS USED
3.3. COMPUTING THE MESSAGE DIGEST
3.4. ALTERNATIVE METHOD OF COMPUTATION
3.5. COMPARISON OF METHODS
3.6. COMPUTATIONAL EXAMPLES
ANNEX A: FIRST SAMPLE MESSAGE AND ITS MESSAGE DIGEST
ANNEX B: A SECOND SAMPLE MESSAGE AND ITS MESSAGE DIGEST
ANNEX C: A THIRD SAMPLE MESSAGE AND ITS MESSAGE DIGEST
ANNEX D: THE 1994 VERSION OF THE SHA
D.1. INTRODUCTION
D.2. COMPUTING THE MESSAGE DIGEST
D.3. ALTERNATIVE METHOD OF COMPUTATION
D.4. COMPARISON OF METHODS
D.5. COMPUTATIONAL EXAMPLES
D.5.1. FIRST SAMPLE MESSAGE AND ITS MESSAGE DIGEST
D.5.2. A SECOND SAMPLE MESSAGE AND ITS MESSAGE
DIGEST
D.5.3. A THIRD SAMPLE MESSAGE AND ITS MESSAGE
DIGEST
The Secure Hash Algorithm (SHA-1) is required for use with the Digital Signature Algorithm and may be used whenever a secure hash algorithm is required.
Published | |
Document Type | Standard |
Status | Current |
Publisher | American Bankers Association |
Pages | |
ISBN | |
Committee | X9 |