Date Published: August 2012
Supersedes:
SP 800-107 (02/25/2009)
Planning Note (12/20/2022):
NIST has decided to withdraw SP 800-107 Rev. 1.
- The supplementary material currently in SP 800-107 Rev. 1 has been moved to the hash functions webpage.
- Next, the requirements listed in SP 800-107 Rev.1 that are not currently addressed in other standards will be moved to a new Implementation Guidance (IG) developed by the Cryptographic Module Validation Program (CMVP). These requirements will again be considered when hash-function-related standards are revised. Once the new IG has been published, NIST will withdraw SP 800-107 Rev. 1.
See the full announcement and Crypto Publication Review Project for more details.
Author(s)
Quynh Dang (NIST)
Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs).
Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ...
See full abstract
Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs).
Hide full abstract
Keywords
hash function; hash-based key derivation algorithms; hash value; HMAC; message digest; randomized hashing; random number generation; SHA; truncated hash values.; Digital signatures; cryptographic hash function; hash algorithms
Control Families
Identification and Authentication; System and Communications Protection; System and Information Integrity