CINXE.COM
SHA-2 - Wikipedia
<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>SHA-2 - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"05ae7b39-aeec-4cb3-a222-fe625af1b167","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"SHA-2","wgTitle":"SHA-2","wgCurRevisionId":1259777470,"wgRevisionId":1259777470,"wgArticleId":1638777,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["Webarchive template wayback links","CS1 German-language sources (de)","Articles with short description","Short description matches Wikidata","Articles containing potentially dated statements from 2011","All articles containing potentially dated statements","All articles with unsourced statements","Articles with unsourced statements from September 2021","Articles containing potentially dated statements from December 2013","Articles with example pseudocode","Cryptographic hash functions", "Checksum algorithms","National Security Agency cryptography"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"SHA-2","wgRelevantArticleId":1638777,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgRedirectedFrom":"SHA-512","wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":50000,"wgInternalRedirectTargetUrl":"/wiki/SHA-2","wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage", "wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q1968605","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","ext.math.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"}; RLPAGEMODULES=["mediawiki.action.view.redirect","ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.quicksurveys.init","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.math.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&only=styles&skin=vector-2022"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="SHA-2 - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/SHA-2"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=SHA-2&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/SHA-2"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-SHA-2 rootpage-SHA-2 skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page's font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&returnto=SHA-2" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&returnto=SHA-2" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&returnto=SHA-2" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&returnto=SHA-2" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Hash_standard" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Hash_standard"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Hash standard</span> </div> </a> <ul id="toc-Hash_standard-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Applications" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Applications"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Applications</span> </div> </a> <ul id="toc-Applications-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Cryptanalysis_and_validation" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Cryptanalysis_and_validation"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Cryptanalysis and validation</span> </div> </a> <button aria-controls="toc-Cryptanalysis_and_validation-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Cryptanalysis and validation subsection</span> </button> <ul id="toc-Cryptanalysis_and_validation-sublist" class="vector-toc-list"> <li id="toc-Official_validation" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Official_validation"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Official validation</span> </div> </a> <ul id="toc-Official_validation-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Test_vectors" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Test_vectors"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Test vectors</span> </div> </a> <ul id="toc-Test_vectors-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Pseudocode" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Pseudocode"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Pseudocode</span> </div> </a> <ul id="toc-Pseudocode-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Comparison_of_SHA_functions" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Comparison_of_SHA_functions"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Comparison of SHA functions</span> </div> </a> <ul id="toc-Comparison_of_SHA_functions-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Implementations" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Implementations"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Implementations</span> </div> </a> <ul id="toc-Implementations-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Further_reading" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Further_reading"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>Further reading</span> </div> </a> <ul id="toc-Further_reading-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">11</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">SHA-2</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 24 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-24" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">24 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%AE%D9%88%D8%A7%D8%B1%D8%B2%D9%85%D9%8A%D8%A9_%D8%A7%D9%84%D8%AA%D9%84%D8%A8%D9%8A%D8%AF_%D8%A7%D9%84%D8%A2%D9%85%D9%86%D8%A9_2" title="خوارزمية التلبيد الآمنة 2 – Arabic" lang="ar" hreflang="ar" data-title="خوارزمية التلبيد الآمنة 2" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-zh-min-nan mw-list-item"><a href="https://zh-min-nan.wikipedia.org/wiki/SHA-2" title="SHA-2 – Minnan" lang="nan" hreflang="nan" data-title="SHA-2" data-language-autonym="閩南語 / Bân-lâm-gú" data-language-local-name="Minnan" class="interlanguage-link-target"><span>閩南語 / Bân-lâm-gú</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/SHA-2" title="SHA-2 – Catalan" lang="ca" hreflang="ca" data-title="SHA-2" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/SHA-2" title="SHA-2 – German" lang="de" hreflang="de" data-title="SHA-2" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/SHA-2" title="SHA-2 – Spanish" lang="es" hreflang="es" data-title="SHA-2" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/SHA-2" title="SHA-2 – Basque" lang="eu" hreflang="eu" data-title="SHA-2" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%A7%D8%B3%E2%80%8C%D8%A7%DA%86%E2%80%8C%D8%A7%DB%8C-%DB%B2" title="اساچای-۲ – Persian" lang="fa" hreflang="fa" data-title="اساچای-۲" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/SHA-2" title="SHA-2 – French" lang="fr" hreflang="fr" data-title="SHA-2" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/SHA-2" title="SHA-2 – Korean" lang="ko" hreflang="ko" data-title="SHA-2" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/SHA-2" title="SHA-2 – Indonesian" lang="id" hreflang="id" data-title="SHA-2" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/SHA-2" title="SHA-2 – Hebrew" lang="he" hreflang="he" data-title="SHA-2" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-lv mw-list-item"><a href="https://lv.wikipedia.org/wiki/Dro%C5%A1ais_jauk%C5%A1anas_algoritms_2" title="Drošais jaukšanas algoritms 2 – Latvian" lang="lv" hreflang="lv" data-title="Drošais jaukšanas algoritms 2" data-language-autonym="Latviešu" data-language-local-name="Latvian" class="interlanguage-link-target"><span>Latviešu</span></a></li><li class="interlanguage-link interwiki-hu mw-list-item"><a href="https://hu.wikipedia.org/wiki/SHA-2" title="SHA-2 – Hungarian" lang="hu" hreflang="hu" data-title="SHA-2" data-language-autonym="Magyar" data-language-local-name="Hungarian" class="interlanguage-link-target"><span>Magyar</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/SHA-2" title="SHA-2 – Japanese" lang="ja" hreflang="ja" data-title="SHA-2" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-uz mw-list-item"><a href="https://uz.wikipedia.org/wiki/SHA-2" title="SHA-2 – Uzbek" lang="uz" hreflang="uz" data-title="SHA-2" data-language-autonym="Oʻzbekcha / ўзбекча" data-language-local-name="Uzbek" class="interlanguage-link-target"><span>Oʻzbekcha / ўзбекча</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/SHA-2" title="SHA-2 – Polish" lang="pl" hreflang="pl" data-title="SHA-2" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/SHA-2" title="SHA-2 – Portuguese" lang="pt" hreflang="pt" data-title="SHA-2" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/SHA-2" title="SHA-2 – Romanian" lang="ro" hreflang="ro" data-title="SHA-2" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/SHA-2" title="SHA-2 – Russian" lang="ru" hreflang="ru" data-title="SHA-2" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/SHA-2" title="SHA-2 – Serbian" lang="sr" hreflang="sr" data-title="SHA-2" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/SHA-2" title="SHA-2 – Turkish" lang="tr" hreflang="tr" data-title="SHA-2" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/SHA-2" title="SHA-2 – Ukrainian" lang="uk" hreflang="uk" data-title="SHA-2" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-wuu mw-list-item"><a href="https://wuu.wikipedia.org/wiki/SHA-2" title="SHA-2 – Wu" lang="wuu" hreflang="wuu" data-title="SHA-2" data-language-autonym="吴语" data-language-local-name="Wu" class="interlanguage-link-target"><span>吴语</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/SHA-2" title="SHA-2 – Chinese" lang="zh" hreflang="zh" data-title="SHA-2" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q1968605#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/SHA-2" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:SHA-2" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/SHA-2"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=SHA-2&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=SHA-2&action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/SHA-2"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=SHA-2&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=SHA-2&action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/SHA-2" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/SHA-2" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=SHA-2&oldid=1259777470" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=SHA-2&action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&page=SHA-2&id=1259777470&wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FSHA-2"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FSHA-2"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&page=SHA-2&action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=SHA-2&printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q1968605" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"><span class="mw-redirectedfrom">(Redirected from <a href="/w/index.php?title=SHA-512&redirect=no" class="mw-redirect" title="SHA-512">SHA-512</a>)</span></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Set of cryptographic hash functions designed by the NSA</div> <style data-mw-deduplicate="TemplateStyles:r1257001546">.mw-parser-output .infobox-subbox{padding:0;border:none;margin:-3px;width:auto;min-width:100%;font-size:100%;clear:none;float:none;background-color:transparent}.mw-parser-output .infobox-3cols-child{margin:auto}.mw-parser-output .infobox .navbar{font-size:100%}@media screen{html.skin-theme-clientpref-night .mw-parser-output .infobox-full-data:not(.notheme)>div:not(.notheme)[style]{background:#1f1f23!important;color:#f8f9fa}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .infobox-full-data:not(.notheme) div:not(.notheme){background:#1f1f23!important;color:#f8f9fa}}@media(min-width:640px){body.skin--responsive .mw-parser-output .infobox-table{display:table!important}body.skin--responsive .mw-parser-output .infobox-table>caption{display:table-caption!important}body.skin--responsive .mw-parser-output .infobox-table>tbody{display:table-row-group}body.skin--responsive .mw-parser-output .infobox-table tr{display:table-row!important}body.skin--responsive .mw-parser-output .infobox-table th,body.skin--responsive .mw-parser-output .infobox-table td{padding-left:inherit;padding-right:inherit}}</style><table class="infobox" style="width:18em; text-align:center; font-size:95%;"><tbody><tr><th colspan="2" class="infobox-above" style="padding-bottom:0.3em; background:transparent; line-height:1.1em; font-size:125%; font-weight:bold;"><a href="/wiki/Secure_Hash_Algorithms" title="Secure Hash Algorithms">Secure Hash Algorithms</a></th></tr><tr><th colspan="2" class="infobox-header" style="background:#E7 C6A5;">Concepts</th></tr><tr><td colspan="2" class="infobox-full-data" style="line-height:1.4em;"><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">hash functions</a>, <a href="/wiki/Secure_Hash_Algorithms" title="Secure Hash Algorithms">SHA</a>, <a href="/wiki/Digital_Signature_Algorithm" title="Digital Signature Algorithm">DSA</a></td></tr><tr><th colspan="2" class="infobox-header" style="background:#E7 C6A5;">Main standards</th></tr><tr><td colspan="2" class="infobox-full-data" style="line-height:1.4em;"><a href="/wiki/SHA-0" class="mw-redirect" title="SHA-0">SHA-0</a>, <a href="/wiki/SHA-1" title="SHA-1">SHA-1</a>, <a class="mw-selflink selflink">SHA-2</a>, <a href="/wiki/SHA-3" title="SHA-3">SHA-3</a> <hr /></td></tr><tr><td colspan="2" class="infobox-navbar"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:SHA-box" title="Template:SHA-box"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:SHA-box" title="Template talk:SHA-box"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:SHA-box" title="Special:EditPage/Template:SHA-box"><abbr title="Edit this template">e</abbr></a></li></ul></div></td></tr></tbody></table> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1257001546"><table class="infobox"><caption class="infobox-title">SHA-2</caption><tbody><tr><th colspan="2" class="infobox-header">General</th></tr><tr><th scope="row" class="infobox-label">Designers</th><td class="infobox-data"><a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a></td></tr><tr><th scope="row" class="infobox-label">First published</th><td class="infobox-data">2001<span class="noprint">; 23 years ago</span><span style="display:none"> (<span class="bday dtstart published updated">2001</span>)</span></td></tr><tr><th scope="row" class="infobox-label">Series</th><td class="infobox-data">(<a href="/wiki/SHA-0" class="mw-redirect" title="SHA-0">SHA-0</a>), <a href="/wiki/SHA-1" title="SHA-1">SHA-1</a>, SHA-2, <a href="/wiki/SHA-3" title="SHA-3">SHA-3</a></td></tr><tr><th scope="row" class="infobox-label">Certification</th><td class="infobox-data"><a href="/wiki/Federal_Information_Processing_Standard" class="mw-redirect" title="Federal Information Processing Standard">FIPS</a> PUB 180-4, <a href="/wiki/CRYPTREC" title="CRYPTREC">CRYPTREC</a>, <a href="/wiki/NESSIE" title="NESSIE">NESSIE</a></td></tr><tr><th colspan="2" class="infobox-header">Detail</th></tr><tr><th scope="row" class="infobox-label"><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Digest sizes</a></th><td class="infobox-data">224, 256, 384, or 512 bits</td></tr><tr><th scope="row" class="infobox-label">Structure</th><td class="infobox-data"><a href="/wiki/Merkle%E2%80%93Damg%C3%A5rd_construction" title="Merkle–Damgård construction">Merkle–Damgård construction</a> with <a href="/wiki/One-way_compression_function#Davies–Meyer" title="One-way compression function">Davies–Meyer compression function</a></td></tr><tr><th scope="row" class="infobox-label"><a href="/wiki/Round_(cryptography)" title="Round (cryptography)">Rounds</a></th><td class="infobox-data">64 or 80</td></tr><tr><th colspan="2" class="infobox-header">Best public <a href="/wiki/Cryptanalysis" title="Cryptanalysis">cryptanalysis</a></th></tr><tr><td colspan="2" class="infobox-below" style="line-height: 1.25em; text-align: left">A 2011 attack breaks <a href="/wiki/Preimage_resistance" class="mw-redirect" title="Preimage resistance">preimage resistance</a> for 57 out of 80 rounds of SHA-512, and 52 out of 64 rounds for SHA-256.<sup id="cite_ref-preimage-khov_1-0" class="reference"><a href="#cite_note-preimage-khov-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> <p>Pseudo-collision attack against up to 46 rounds of SHA-256.<sup id="cite_ref-collision-lamberger_2-0" class="reference"><a href="#cite_note-collision-lamberger-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> </p> SHA-256 and SHA-512 are prone to <a href="/wiki/Length_extension_attack" title="Length extension attack">length extension attacks</a>. By guessing the hidden part of the state, length extension attacks on SHA-224 and SHA-384 succeed with probability 2<sup>−(256−224)</sup> = 2<sup>−32</sup> > 2<sup>−224</sup> and 2<sup>−(512−384)</sup> = 2<sup>−128</sup> > 2<sup>−384</sup> respectively.</td></tr></tbody></table> <p><b>SHA-2</b> (<b>Secure Hash Algorithm 2</b>) is a set of <a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">cryptographic hash functions</a> designed by the United States <a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a> (NSA) and first published in 2001.<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:0_4-0" class="reference"><a href="#cite_note-:0-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> They are built using the <a href="/wiki/Merkle%E2%80%93Damg%C3%A5rd_construction" title="Merkle–Damgård construction">Merkle–Damgård construction</a>, from a one-way compression function itself built using the <a href="/wiki/One-way_compression_function#Davies–Meyer" title="One-way compression function">Davies–Meyer structure</a> from a specialized block cipher. </p><p>SHA-2 includes significant changes from its predecessor, <b><a href="/wiki/SHA-1" title="SHA-1">SHA-1</a></b>. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits:<sup id="cite_ref-:1_5-0" class="reference"><a href="#cite_note-:1-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> <b>SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256</b>. SHA-256 and SHA-512 are novel hash functions whose digests are eight 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds. SHA-224 and SHA-384 are truncated versions of SHA-256 and SHA-512 respectively, computed with different initial values. SHA-512/224 and SHA-512/256 are also truncated versions of SHA-512, but the initial values are generated using the method described in <a href="/wiki/Federal_Information_Processing_Standards" title="Federal Information Processing Standards">Federal Information Processing Standards</a> (FIPS) PUB 180-4. </p><p>SHA-2 was first published by the <a href="/wiki/National_Institute_of_Standards_and_Technology" title="National Institute of Standards and Technology">National Institute of Standards and Technology</a> (NIST) as a U.S. federal standard. The SHA-2 family of algorithms are patented in the U.S.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> The United States has released the patent under a <a href="/wiki/Royalty-free" title="Royalty-free">royalty-free</a> license.<sup id="cite_ref-:1_5-1" class="reference"><a href="#cite_note-:1-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> </p><p>As of 2011,<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=SHA-2&action=edit">[update]</a></sup> the best public attacks break <a href="/wiki/Preimage_attack" title="Preimage attack">preimage resistance</a> for 52 out of 64 rounds of SHA-256 or 57 out of 80 rounds of SHA-512, and <a href="/wiki/Collision_attack" title="Collision attack">collision resistance</a> for 46 out of 64 rounds of SHA-256.<sup id="cite_ref-preimage-khov_1-1" class="reference"><a href="#cite_note-preimage-khov-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-collision-lamberger_2-1" class="reference"><a href="#cite_note-collision-lamberger-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Hash_standard">Hash standard</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=1" title="Edit section: Hash standard"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:SHA-2.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/7/7d/SHA-2.svg/400px-SHA-2.svg.png" decoding="async" width="400" height="282" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/7/7d/SHA-2.svg/600px-SHA-2.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/7/7d/SHA-2.svg/800px-SHA-2.svg.png 2x" data-file-width="836" data-file-height="590" /></a><figcaption>One iteration in a SHA-2 family compression function. The blue components perform the following operations:<br />     <span class="mwe-math-element"><span class="mwe-math-mathml-inline mwe-math-mathml-a11y" style="display: none;"><math xmlns="http://www.w3.org/1998/Math/MathML" alttext="{\displaystyle \operatorname {Ch} (E,F,G)=(E\land F)\oplus (\neg E\land G)}"> <semantics> <mrow class="MJX-TeXAtom-ORD"> <mstyle displaystyle="true" scriptlevel="0"> <mi>Ch</mi> <mo>⁡<!-- --></mo> <mo stretchy="false">(</mo> <mi>E</mi> <mo>,</mo> <mi>F</mi> <mo>,</mo> <mi>G</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mo stretchy="false">(</mo> <mi>E</mi> <mo>∧<!-- ∧ --></mo> <mi>F</mi> <mo stretchy="false">)</mo> <mo>⊕<!-- ⊕ --></mo> <mo stretchy="false">(</mo> <mi mathvariant="normal">¬<!-- ¬ --></mi> <mi>E</mi> <mo>∧<!-- ∧ --></mo> <mi>G</mi> <mo stretchy="false">)</mo> </mstyle> </mrow> <annotation encoding="application/x-tex">{\displaystyle \operatorname {Ch} (E,F,G)=(E\land F)\oplus (\neg E\land G)}</annotation> </semantics> </math></span><img src="https://wikimedia.org/api/rest_v1/media/math/render/svg/aa960a18f0f865cdb519c20bba93c19944b4b839" class="mwe-math-fallback-image-inline mw-invert skin-invert" aria-hidden="true" style="vertical-align: -0.838ex; width:35.583ex; height:2.843ex;" alt="{\displaystyle \operatorname {Ch} (E,F,G)=(E\land F)\oplus (\neg E\land G)}"></span><br />     <span class="mwe-math-element"><span class="mwe-math-mathml-inline mwe-math-mathml-a11y" style="display: none;"><math xmlns="http://www.w3.org/1998/Math/MathML" alttext="{\displaystyle \operatorname {Ma} (A,B,C)=(A\land B)\oplus (A\land C)\oplus (B\land C)}"> <semantics> <mrow class="MJX-TeXAtom-ORD"> <mstyle displaystyle="true" scriptlevel="0"> <mi>Ma</mi> <mo>⁡<!-- --></mo> <mo stretchy="false">(</mo> <mi>A</mi> <mo>,</mo> <mi>B</mi> <mo>,</mo> <mi>C</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mo stretchy="false">(</mo> <mi>A</mi> <mo>∧<!-- ∧ --></mo> <mi>B</mi> <mo stretchy="false">)</mo> <mo>⊕<!-- ⊕ --></mo> <mo stretchy="false">(</mo> <mi>A</mi> <mo>∧<!-- ∧ --></mo> <mi>C</mi> <mo stretchy="false">)</mo> <mo>⊕<!-- ⊕ --></mo> <mo stretchy="false">(</mo> <mi>B</mi> <mo>∧<!-- ∧ --></mo> <mi>C</mi> <mo stretchy="false">)</mo> </mstyle> </mrow> <annotation encoding="application/x-tex">{\displaystyle \operatorname {Ma} (A,B,C)=(A\land B)\oplus (A\land C)\oplus (B\land C)}</annotation> </semantics> </math></span><img src="https://wikimedia.org/api/rest_v1/media/math/render/svg/09e71d25f7d4ecf3600af38cb14078a50222bfcf" class="mwe-math-fallback-image-inline mw-invert skin-invert" aria-hidden="true" style="vertical-align: -0.838ex; width:44.946ex; height:2.843ex;" alt="{\displaystyle \operatorname {Ma} (A,B,C)=(A\land B)\oplus (A\land C)\oplus (B\land C)}"></span><br />     <span class="mwe-math-element"><span class="mwe-math-mathml-inline mwe-math-mathml-a11y" style="display: none;"><math xmlns="http://www.w3.org/1998/Math/MathML" alttext="{\displaystyle \Sigma _{0}(A)=(A\!\ggg \!2)\oplus (A\!\ggg \!13)\oplus (A\!\ggg \!22)}"> <semantics> <mrow class="MJX-TeXAtom-ORD"> <mstyle displaystyle="true" scriptlevel="0"> <msub> <mi mathvariant="normal">Σ<!-- Σ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mn>0</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>A</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mo stretchy="false">(</mo> <mi>A</mi> <mspace width="negativethinmathspace" /> <mo>⋙<!-- ⋙ --></mo> <mspace width="negativethinmathspace" /> <mn>2</mn> <mo stretchy="false">)</mo> <mo>⊕<!-- ⊕ --></mo> <mo stretchy="false">(</mo> <mi>A</mi> <mspace width="negativethinmathspace" /> <mo>⋙<!-- ⋙ --></mo> <mspace width="negativethinmathspace" /> <mn>13</mn> <mo stretchy="false">)</mo> <mo>⊕<!-- ⊕ --></mo> <mo stretchy="false">(</mo> <mi>A</mi> <mspace width="negativethinmathspace" /> <mo>⋙<!-- ⋙ --></mo> <mspace width="negativethinmathspace" /> <mn>22</mn> <mo stretchy="false">)</mo> </mstyle> </mrow> <annotation encoding="application/x-tex">{\displaystyle \Sigma _{0}(A)=(A\!\ggg \!2)\oplus (A\!\ggg \!13)\oplus (A\!\ggg \!22)}</annotation> </semantics> </math></span><img src="https://wikimedia.org/api/rest_v1/media/math/render/svg/c583746b69370e003b08d29c0555e20204682135" class="mwe-math-fallback-image-inline mw-invert skin-invert" aria-hidden="true" style="vertical-align: -0.838ex; width:42.373ex; height:2.843ex;" alt="{\displaystyle \Sigma _{0}(A)=(A\!\ggg \!2)\oplus (A\!\ggg \!13)\oplus (A\!\ggg \!22)}"></span><br />     <span class="mwe-math-element"><span class="mwe-math-mathml-inline mwe-math-mathml-a11y" style="display: none;"><math xmlns="http://www.w3.org/1998/Math/MathML" alttext="{\displaystyle \Sigma _{1}(E)=(E\!\ggg \!6)\oplus (E\!\ggg \!11)\oplus (E\!\ggg \!25)}"> <semantics> <mrow class="MJX-TeXAtom-ORD"> <mstyle displaystyle="true" scriptlevel="0"> <msub> <mi mathvariant="normal">Σ<!-- Σ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mn>1</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>E</mi> <mo stretchy="false">)</mo> <mo>=</mo> <mo stretchy="false">(</mo> <mi>E</mi> <mspace width="negativethinmathspace" /> <mo>⋙<!-- ⋙ --></mo> <mspace width="negativethinmathspace" /> <mn>6</mn> <mo stretchy="false">)</mo> <mo>⊕<!-- ⊕ --></mo> <mo stretchy="false">(</mo> <mi>E</mi> <mspace width="negativethinmathspace" /> <mo>⋙<!-- ⋙ --></mo> <mspace width="negativethinmathspace" /> <mn>11</mn> <mo stretchy="false">)</mo> <mo>⊕<!-- ⊕ --></mo> <mo stretchy="false">(</mo> <mi>E</mi> <mspace width="negativethinmathspace" /> <mo>⋙<!-- ⋙ --></mo> <mspace width="negativethinmathspace" /> <mn>25</mn> <mo stretchy="false">)</mo> </mstyle> </mrow> <annotation encoding="application/x-tex">{\displaystyle \Sigma _{1}(E)=(E\!\ggg \!6)\oplus (E\!\ggg \!11)\oplus (E\!\ggg \!25)}</annotation> </semantics> </math></span><img src="https://wikimedia.org/api/rest_v1/media/math/render/svg/5bbb767c4ac3154b0e41612bba422dff7dc27e43" class="mwe-math-fallback-image-inline mw-invert skin-invert" aria-hidden="true" style="vertical-align: -0.838ex; width:42.503ex; height:2.843ex;" alt="{\displaystyle \Sigma _{1}(E)=(E\!\ggg \!6)\oplus (E\!\ggg \!11)\oplus (E\!\ggg \!25)}"></span> <br /> The bitwise rotation uses different constants for SHA-512. The given numbers are for SHA-256.<br /> The red <span class="mwe-math-element"><span class="mwe-math-mathml-inline mwe-math-mathml-a11y" style="display: none;"><math xmlns="http://www.w3.org/1998/Math/MathML" alttext="{\displaystyle \color {red}\boxplus }"> <semantics> <mrow class="MJX-TeXAtom-ORD"> <mstyle displaystyle="true" scriptlevel="0"> <mstyle mathcolor="red"> <mo>⊞<!-- ⊞ --></mo> </mstyle> </mstyle> </mrow> <annotation encoding="application/x-tex">{\displaystyle \color {red}\boxplus }</annotation> </semantics> </math></span><img src="https://wikimedia.org/api/rest_v1/media/math/render/svg/234b9f9d061d7f499f6ba215b2cec330613cd332" class="mwe-math-fallback-image-inline mw-invert skin-invert" aria-hidden="true" style="vertical-align: -0.338ex; width:1.808ex; height:2.176ex;" alt="{\displaystyle \color {red}\boxplus }"></span> is addition modulo 2<sup>32</sup> for SHA-256, or 2<sup>64</sup> for SHA-512. </figcaption></figure> <p>With the publication of FIPS PUB 180-2, NIST added three additional hash functions in the SHA family. The algorithms are collectively known as SHA-2, named after their digest lengths (in bits): SHA-256, SHA-384, and SHA-512. </p><p>The algorithms were first published in 2001 in the draft FIPS PUB 180-2, at which time public review and comments were accepted. In August 2002, FIPS PUB 180-2 became the new <a href="/wiki/Secure_Hash_Standard" class="mw-redirect" title="Secure Hash Standard">Secure Hash Standard</a>, replacing FIPS PUB 180-1, which was released in April 1995. The updated standard included the original SHA-1 algorithm, with updated technical notation consistent with that describing the inner workings of the SHA-2 family.<sup id="cite_ref-:0_4-1" class="reference"><a href="#cite_note-:0-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> </p><p>In February 2004, a change notice was published for FIPS PUB 180-2, specifying an additional variant, SHA-224, defined to match the key length of two-key <a href="/wiki/Triple_DES" title="Triple DES">Triple DES</a>.<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> In October 2008, the standard was updated in FIPS PUB 180-3, including SHA-224 from the change notice, but otherwise making no fundamental changes to the standard. The primary motivation for updating the standard was relocating security information about the hash algorithms and recommendations for their use to Special Publications 800-107 and 800-57.<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-sp800107_9-0" class="reference"><a href="#cite_note-sp800107-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-sp80057_10-0" class="reference"><a href="#cite_note-sp80057-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> Detailed test data and example message digests were also removed from the standard, and provided as separate documents.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> </p><p>In January 2011, NIST published SP800-131A, which specified a move from the then-current minimum of 80-bit security (provided by SHA-1) allowable for federal government use until the end of 2013, to 112-bit security (provided by SHA-2) being both the minimum requirement (starting in 2014) and the recommended <a href="/wiki/Security_level_management" title="Security level management">security level</a> (starting from the publication date in 2011).<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> </p><p>In March 2012, the standard was updated in FIPS PUB 180-4, adding the hash functions SHA-512/224 and SHA-512/256, and describing a method for generating initial values for truncated versions of SHA-512. Additionally, a restriction on <a href="/wiki/Padding_(cryptography)" title="Padding (cryptography)">padding</a> the input data prior to hash calculation was removed, allowing hash data to be calculated simultaneously with content generation, such as a real-time video or audio feed. Padding the final data block must still occur prior to hash output.<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> </p><p>In July 2012, NIST revised SP800-57, which provides guidance for cryptographic key management. The publication disallowed creation of digital signatures with a hash security lower than 112 bits after 2013. The previous revision from 2007 specified the cutoff to be the end of 2010.<sup id="cite_ref-sp80057_10-1" class="reference"><a href="#cite_note-sp80057-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> In August 2012, NIST revised SP800-107 in the same manner.<sup id="cite_ref-sp800107_9-1" class="reference"><a href="#cite_note-sp800107-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> </p><p>The <a href="/wiki/NIST_hash_function_competition" title="NIST hash function competition">NIST hash function competition</a> selected a new hash function, <a href="/wiki/SHA-3" title="SHA-3">SHA-3</a>, in 2012.<sup id="cite_ref-nist.gov_14-0" class="reference"><a href="#cite_note-nist.gov-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> The SHA-3 algorithm is not derived from SHA-2. </p> <div class="mw-heading mw-heading2"><h2 id="Applications">Applications</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=2" title="Edit section: Applications"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">Further information: <a href="/wiki/Cryptographic_hash_function#Applications" title="Cryptographic hash function">Cryptographic hash function § Applications</a></div> <p>The SHA-2 hash function is implemented in some widely used security applications and protocols, including <a href="/wiki/Transport_Layer_Security" title="Transport Layer Security">TLS</a> and <a href="/wiki/Secure_Sockets_Layer" class="mw-redirect" title="Secure Sockets Layer">SSL</a>, <a href="/wiki/Pretty_Good_Privacy" title="Pretty Good Privacy">PGP</a>, <a href="/wiki/Secure_Shell" title="Secure Shell">SSH</a>, <a href="/wiki/S/MIME" title="S/MIME">S/MIME</a>, and <a href="/wiki/IPsec" title="IPsec">IPsec</a>. The inherent computational demand of SHA-2 algorithms has driven the proposal of more efficient solutions, such as those based on application-specific integrated circuits (ASICs) hardware accelerators.<sup id="cite_ref-franck_15-0" class="reference"><a href="#cite_note-franck-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> </p><p>SHA-256 is used for authenticating <a href="/wiki/Debian" title="Debian">Debian</a> software packages<sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> and in the <a href="/wiki/DKIM" class="mw-redirect" title="DKIM">DKIM</a> message signing standard; SHA-512 is part of a system to authenticate archival video from the <a href="/wiki/International_Criminal_Tribunal_for_Rwanda" title="International Criminal Tribunal for Rwanda">International Criminal Tribunal of the Rwandan genocide</a>.<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> SHA-256 and SHA-512 are proposed for use in <a href="/wiki/DNSSEC" class="mw-redirect" title="DNSSEC">DNSSEC</a>.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> Unix and Linux vendors are moving to using 256- and 512-bit SHA-2 for secure password hashing.<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup> </p><p>Several <a href="/wiki/Cryptocurrency" title="Cryptocurrency">cryptocurrencies</a>, including <a href="/wiki/Bitcoin" title="Bitcoin">Bitcoin</a>, use SHA-256 for verifying transactions and calculating <a href="/wiki/Proof_of_work" title="Proof of work">proof of work</a><sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup> or <a href="/wiki/Proof_of_stake" title="Proof of stake">proof of stake</a>.<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> The rise of <a href="/wiki/ASIC" class="mw-redirect" title="ASIC">ASIC</a> SHA-2 accelerator chips has led to the use of <a href="/wiki/Scrypt" title="Scrypt">scrypt</a>-based proof-of-work schemes. </p><p>SHA-1 and SHA-2 are the <a href="/wiki/Secure_Hash_Algorithms" title="Secure Hash Algorithms">Secure Hash Algorithms</a> required by law for use in certain <a href="/wiki/Federal_government_of_the_United_States" title="Federal government of the United States">U.S. Government</a> applications, including use within other cryptographic algorithms and protocols, for the protection of sensitive unclassified information. FIPS PUB 180-1 also encouraged adoption and use of SHA-1 by private and commercial organizations. SHA-1 is being retired for most government uses; the U.S. National Institute of Standards and Technology says, "Federal agencies <i><b>should</b></i> stop using SHA-1 for...applications that require collision resistance as soon as practical, and must use the SHA-2 family of hash functions for these applications after 2010" (emphasis in original).<sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> NIST's directive that U.S. government agencies ought to, but not explicitly must, stop uses of SHA-1 after 2010<sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> was hoped to accelerate migration away from SHA-1. </p><p>The SHA-2 functions were not quickly adopted initially, despite better security than SHA-1. Reasons might include lack of support for SHA-2 on systems running Windows XP SP2 or older<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> and a lack of perceived urgency since SHA-1 collisions had not yet been found. The <a href="/wiki/Google_Chrome" title="Google Chrome">Google Chrome</a> team announced a plan to make their web browser gradually stop honoring SHA-1-dependent TLS certificates over a period from late 2014 and early 2015.<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> Similarly, Microsoft announced<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup> that <a href="/wiki/Internet_Explorer" title="Internet Explorer">Internet Explorer</a> and <a href="/wiki/Microsoft_Edge" title="Microsoft Edge">Edge</a> would stop honoring public SHA-1-signed TLS certificates from February 2017. <a href="/wiki/Mozilla" title="Mozilla">Mozilla</a> disabled SHA-1 in early January 2016, but had to re-enable it temporarily via a <a href="/wiki/Firefox" title="Firefox">Firefox</a> update, after problems with web-based user interfaces of some router models and <a href="/wiki/Security_appliance" title="Security appliance">security appliances</a>.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Cryptanalysis_and_validation">Cryptanalysis and validation</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=3" title="Edit section: Cryptanalysis and validation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>For a hash function for which <i>L</i> is the number of <a href="/wiki/Bit" title="Bit">bits</a> in the <a href="/wiki/Message_digest" class="mw-redirect" title="Message digest">message digest</a>, finding a message that corresponds to a given message digest can always be done using a <a href="/wiki/Brute-force_attack" title="Brute-force attack">brute force</a> search in 2<sup><i>L</i></sup> evaluations. This is called a <a href="/wiki/Preimage_attack" title="Preimage attack">preimage attack</a> and may or may not be practical depending on <i>L</i> and the particular computing environment. The second criterion, finding two different messages that produce the same message digest, known as a <a href="/wiki/Hash_collision" title="Hash collision">collision</a>, requires on average only 2<sup><i>L</i>/2</sup> evaluations using a <a href="/wiki/Birthday_attack" title="Birthday attack">birthday attack</a>. </p><p>Some of the applications that use cryptographic hashes, such as password storage, are only minimally affected by a <a href="/wiki/Collision_attack" title="Collision attack">collision attack</a>. Constructing a password that works for a given account requires a preimage attack, as well as access to the hash of the original password (typically in the <code><a href="/wiki/Shadow_password" class="mw-redirect" title="Shadow password">shadow</a></code> file) which may or may not be trivial. Reversing password encryption (e.g., to obtain a password to try against a user's account elsewhere) is not made possible by the attacks. (However, even a secure password hash cannot prevent brute-force attacks on <a href="/wiki/Password_strength" title="Password strength">weak passwords</a>.) </p><p>In the case of document signing, an attacker could not simply fake a signature from an existing document—the attacker would have to produce a pair of documents, one innocuous and one damaging, and get the private key holder to sign the innocuous document. There are practical circumstances in which this is possible; until the end of 2008, it was possible to create forged <a href="/wiki/Transport_Layer_Security" title="Transport Layer Security">SSL</a> certificates using an <a href="/wiki/MD5" title="MD5">MD5</a> collision which would be accepted by widely used web browsers.<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> </p><p>Increased interest in cryptographic hash analysis during the SHA-3 competition produced several new attacks on the SHA-2 family, the best of which are given in the table below. Only the collision attacks are of practical complexity; none of the attacks extend to the full round hash function. </p><p>At <a href="/wiki/Fast_Software_Encryption" class="mw-redirect" title="Fast Software Encryption">FSE</a> 2012, researchers at <a href="/wiki/Sony" title="Sony">Sony</a> gave a presentation suggesting pseudo-collision attacks could be extended to 52 rounds on SHA-256 and 57 rounds on SHA-512 by building upon the <a href="/wiki/Biclique_attack" title="Biclique attack">biclique</a> pseudo-preimage attack.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup> </p> <table class="wikitable"> <tbody><tr> <th>Published in </th> <th>Year </th> <th>Attack method </th> <th>Attack </th> <th>Variant </th> <th>Rounds </th> <th>Complexity </th></tr> <tr> <td rowspan="2"><i>New Collision Attacks Against Up To 24-step SHA-2</i><sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup></td> <td rowspan="2">2008</td> <td rowspan="2">Differential</td> <td rowspan="2">Collision</td> <td>SHA-256</td> <td>24/64</td> <td>2<sup>15.5</sup> </td></tr> <tr> <td>SHA-512</td> <td>24/80</td> <td>2<sup>22.5</sup> </td></tr> <tr> <td rowspan="4"><i>Preimages for step-reduced SHA-2</i><sup id="cite_ref-preimage-merged_34-0" class="reference"><a href="#cite_note-preimage-merged-34"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup></td> <td rowspan="4">2009</td> <td rowspan="4"><a href="/wiki/Meet-in-the-middle_attack" title="Meet-in-the-middle attack">Meet-in-the-middle</a></td> <td rowspan="4">Preimage</td> <td rowspan="2">SHA-256</td> <td>42/64</td> <td>2<sup>251.7</sup> </td></tr> <tr> <td>43/64</td> <td>2<sup>254.9</sup> </td></tr> <tr> <td rowspan="2">SHA-512</td> <td>42/80</td> <td>2<sup>502.3</sup> </td></tr> <tr> <td>46/80</td> <td>2<sup>511.5</sup> </td></tr> <tr> <td rowspan="2"><i>Advanced meet-in-the-middle preimage attacks</i><sup id="cite_ref-preimage-gou_35-0" class="reference"><a href="#cite_note-preimage-gou-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup></td> <td rowspan="2">2010</td> <td rowspan="2">Meet-in-the-middle</td> <td rowspan="2">Preimage</td> <td>SHA-256</td> <td>42/64</td> <td>2<sup>248.4</sup> </td></tr> <tr> <td>SHA-512</td> <td>42/80</td> <td>2<sup>494.6</sup> </td></tr> <tr> <td rowspan="2"><i>Higher-Order Differential Attack on Reduced SHA-256</i><sup id="cite_ref-collision-lamberger_2-2" class="reference"><a href="#cite_note-collision-lamberger-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup></td> <td rowspan="2">2011</td> <td rowspan="2"><a href="/wiki/Differential_cryptanalysis" title="Differential cryptanalysis">Differential</a></td> <td rowspan="2">Pseudo-collision</td> <td rowspan="2">SHA-256</td> <td>46/64</td> <td>2<sup>178</sup> </td></tr> <tr> <td>33/64</td> <td>2<sup>46</sup> </td></tr> <tr> <td rowspan="4"><i>Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family</i><sup id="cite_ref-preimage-khov_1-2" class="reference"><a href="#cite_note-preimage-khov-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup></td> <td rowspan="4">2011</td> <td rowspan="4"><a href="/wiki/Biclique_attack" title="Biclique attack">Biclique</a></td> <td rowspan="2">Preimage</td> <td>SHA-256</td> <td>45/64</td> <td>2<sup>255.5</sup> </td></tr> <tr> <td>SHA-512</td> <td>50/80</td> <td>2<sup>511.5</sup> </td></tr> <tr> <td rowspan="2">Pseudo-preimage</td> <td>SHA-256</td> <td>52/64</td> <td>2<sup>255</sup> </td></tr> <tr> <td>SHA-512</td> <td>57/80</td> <td>2<sup>511</sup> </td></tr> <tr> <td rowspan="2"><i>Improving Local Collisions: New Attacks on Reduced SHA-256</i><sup id="cite_ref-collision-mendel_36-0" class="reference"><a href="#cite_note-collision-mendel-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup></td> <td rowspan="2">2013</td> <td rowspan="2">Differential</td> <td>Collision</td> <td>SHA-256</td> <td>31/64</td> <td>2<sup>65.5</sup> </td></tr> <tr> <td>Pseudo-collision</td> <td>SHA-256</td> <td>38/64</td> <td>2<sup>37</sup> </td></tr> <tr> <td rowspan="1"><i>Branching Heuristics in Differential Collision Search with Applications to SHA-512</i><sup id="cite_ref-collision-eichlseder_37-0" class="reference"><a href="#cite_note-collision-eichlseder-37"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup></td> <td>2014</td> <td>Heuristic differential</td> <td>Pseudo-collision</td> <td>SHA-512</td> <td>38/80</td> <td>2<sup>40.5</sup> </td></tr> <tr> <td rowspan="3"><i>Analysis of SHA-512/224 and SHA-512/256</i><sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup></td> <td rowspan="3">2016</td> <td rowspan="3">Differential</td> <td rowspan="2">Collision</td> <td>SHA-256</td> <td>28/64</td> <td>practical </td></tr> <tr> <td>SHA-512</td> <td>27/80</td> <td>practical </td></tr> <tr> <td>Pseudo-collision</td> <td>SHA-512</td> <td>39/80</td> <td>practical </td></tr> <tr> <td rowspan="3"><i>New Records in Collision Attacks on SHA-2</i><sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup></td> <td rowspan="3">2023</td> <td rowspan="3">Differential</td> <td rowspan="2">Collision</td> <td>SHA-256</td> <td>31/64</td> <td>2<sup>49.8</sup> </td></tr> <tr> <td>SHA-512</td> <td>31/80</td> <td>2<sup>115.6</sup> </td></tr> <tr> <td>Pseudo-collision</td> <td>SHA-256</td> <td>39/64</td> <td>practical </td></tr></tbody></table> <div class="mw-heading mw-heading3"><h3 id="Official_validation">Official validation</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=4" title="Edit section: Official validation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Cryptographic_Module_Validation_Program" title="Cryptographic Module Validation Program">Cryptographic Module Validation Program</a></div> <p>Implementations of all FIPS-approved security functions can be officially validated through the <a href="/wiki/Cryptographic_Module_Validation_Program" title="Cryptographic Module Validation Program">CMVP program</a>, jointly run by the <a href="/wiki/National_Institute_of_Standards_and_Technology" title="National Institute of Standards and Technology">National Institute of Standards and Technology</a> (NIST) and the <a href="/wiki/Communications_Security_Establishment" title="Communications Security Establishment">Communications Security Establishment</a> (CSE). For informal verification, a package to generate a high number of test vectors is made available for download on the NIST site; the resulting verification, however, does not replace the formal CMVP validation, which is required by law<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (September 2021)">citation needed</span></a></i>]</sup> for certain applications. </p><p>As of December 2013,<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=SHA-2&action=edit">[update]</a></sup> there are over 1300 validated implementations of SHA-256 and over 900 of SHA-512, with only 5 of them being capable of handling messages with a length in bits not a multiple of eight while supporting both variants.<sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Test_vectors">Test vectors</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=5" title="Edit section: Test vectors"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Hash values of an empty string (i.e., a zero-length input text). </p> <pre><style data-mw-deduplicate="TemplateStyles:r1239334494">@media screen{html.skin-theme-clientpref-night .mw-parser-output div:not(.notheme)>.tmp-color,html.skin-theme-clientpref-night .mw-parser-output p>.tmp-color,html.skin-theme-clientpref-night .mw-parser-output table:not(.notheme) .tmp-color{color:inherit!important}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output div:not(.notheme)>.tmp-color,html.skin-theme-clientpref-os .mw-parser-output p>.tmp-color,html.skin-theme-clientpref-os .mw-parser-output table:not(.notheme) .tmp-color{color:inherit!important}}</style><span class="tmp-color" style="color:green">SHA224("")</span> 0x d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA256("")</span> 0x e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA384("")</span> 0x 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA512("")</span> 0x cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA512/224("")</span> 0x 6ed0dd02806fa89e25de060c19d3ac86cabb87d6a0ddd05c333b84f4 <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA512/256("")</span> 0x c672b8d1ef56ed28ab87c3622c5114069bdd3ad7b8f9737498d0c01ecef0967a </pre> <p>Even a small change in the message will (with overwhelming probability) result in a different hash, due to the <a href="/wiki/Avalanche_effect" title="Avalanche effect">avalanche effect</a>. For example, adding a period to the end of the following sentence changes approximately half (111 out of 224) of the bits in the hash, equivalent to picking a new hash at random: </p> <pre><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA224("<a href="/wiki/The_quick_brown_fox_jumps_over_the_lazy_dog" title="The quick brown fox jumps over the lazy dog">The quick brown fox jumps over the lazy dog</a>")</span> 0x 730e109bd7a8a32b1cb9d9a09aa2325d2430587ddbc0c38bad911525 <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA224("<a href="/wiki/The_quick_brown_fox_jumps_over_the_lazy_dog" title="The quick brown fox jumps over the lazy dog">The quick brown fox jumps over the lazy dog</a><span style="color:black;background:yellow">.</span>")</span> 0x 619cba8e8e05826e9b8c519c0a5c68f4fb653e8a3d8aa04bb2c8cd4c </pre> <div class="mw-heading mw-heading2"><h2 id="Pseudocode">Pseudocode</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=6" title="Edit section: Pseudocode"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Pseudocode" title="Pseudocode">Pseudocode</a> for the SHA-256 algorithm follows. Note the great increase in mixing between bits of the <code>w[16..63]</code> words compared to SHA-1. </p> <pre><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Note 1: All variables are 32 bit unsigned integers and addition is calculated modulo 2<sup>32</sup></i></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Note 2: For each round, there is one round constant k[i] and one entry in the message schedule array w[i], 0 ≤ i ≤ 63</i></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Note 3: The compression function uses 8 working variables, a through h</i></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Note 4: Big-endian convention is used when expressing the constants in this pseudocode,</i></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>and when parsing message block data from bytes to words, for example,</i></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>the first word of the input message "abc" after padding is 0x61626380</i></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Initialize hash values:</i></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">(first 32 bits of the <i>fractional parts</i> of the square roots of the first 8 primes 2..19):</span> h0 := 0x6a09e667 h1 := 0xbb67ae85 h2 := 0x3c6ef372 h3 := 0xa54ff53a h4 := 0x510e527f h5 := 0x9b05688c h6 := 0x1f83d9ab h7 := 0x5be0cd19 <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Initialize array of round constants:</i></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">(first 32 bits of the <i>fractional parts</i> of the cube roots of the first 64 primes 2..311):</span> k[0..63] := 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5, 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174, 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da, 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967, 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85, 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070, 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3, 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2 <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Pre-processing (Padding):</i></span> begin with the original message of length L bits append a single '1' bit append K '0' bits, where K is the minimum number >= 0 such that (L + 1 + K + 64) is a multiple of 512 append L as a 64-bit big-endian integer, making the total post-processed length a multiple of 512 bits such that the bits in the message are: <original message of length L> 1 <K zeros> <L as 64 bit integer> , (the number of bits will be a multiple of 512) <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Process the message in successive 512-bit chunks:</i></span> break message into 512-bit chunks <b>for</b> each chunk create a 64-entry message schedule array w[0..63] of 32-bit words <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>(The initial values in w[0..63] don't matter, so many implementations zero them here)</i></span> copy chunk into first 16 words w[0..15] of the message schedule array <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Extend the first 16 words into the remaining 48 words w[16..63] of the message schedule array:</i></span> <b>for</b> i <b>from</b> 16 to 63 s0 := (w[i-15] <b>rightrotate</b> 7) <b>xor</b> (w[i-15] <b>rightrotate</b> 18) <b>xor</b> (w[i-15] <b>rightshift</b> 3) s1 := (w[i-2] <b>rightrotate</b> 17) <b>xor</b> (w[i-2] <b>rightrotate</b> 19) <b>xor</b> (w[i-2] <b>rightshift</b> 10) w[i] := w[i-16] <b>+</b> s0 <b>+</b> w[i-7] <b>+</b> s1 <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Initialize working variables to current hash value:</i></span> a := h0 b := h1 c := h2 d := h3 e := h4 f := h5 g := h6 h := h7 <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Compression function main loop:</i></span> <b>for</b> i <b>from</b> 0 to 63 S1 := (e <b>rightrotate</b> 6) <b>xor</b> (e <b>rightrotate</b> 11) <b>xor</b> (e <b>rightrotate</b> 25) ch := (e <b>and</b> f) <b>xor</b> ((<b>not</b> e) <b>and</b> g) temp1 := h <b>+</b> S1 <b>+</b> ch <b>+</b> k[i] <b>+</b> w[i] S0 := (a <b>rightrotate</b> 2) <b>xor</b> (a <b>rightrotate</b> 13) <b>xor</b> (a <b>rightrotate</b> 22) maj := (a <b>and</b> b) <b>xor</b> (a <b>and</b> c) <b>xor</b> (b <b>and</b> c) temp2 := S0 <b>+</b> maj h := g g := f f := e e := d <b>+</b> temp1 d := c c := b b := a a := temp1 <b>+</b> temp2 <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Add the compressed chunk to the current hash value:</i></span> h0 := h0 <b>+</b> a h1 := h1 <b>+</b> b h2 := h2 <b>+</b> c h3 := h3 <b>+</b> d h4 := h4 <b>+</b> e h5 := h5 <b>+</b> f h6 := h6 <b>+</b> g h7 := h7 <b>+</b> h <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"><i>Produce the final hash value (big-endian):</i></span> digest := hash := h0 <b>append</b> h1 <b>append</b> h2 <b>append</b> h3 <b>append</b> h4 <b>append</b> h5 <b>append</b> h6 <b>append</b> h7 </pre> <p>The computation of the <code>ch</code> and <code>maj</code> values can be optimized the same way <a href="/wiki/SHA-1#SHA-1_pseudocode" title="SHA-1">as described for SHA-1</a>. </p><p>SHA-224 is identical to SHA-256, except that: </p> <ul><li>the initial hash values <code>h0</code> through <code>h7</code> are different, and</li> <li>the output is constructed by omitting <code>h7</code>.</li></ul> <pre><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA-224 initial hash values (in big endian):</span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">(The second 32 bits of the fractional parts of the square roots of the 9th through 16th primes 23..53)</span> h[0..7] := 0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939, 0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4 </pre> <p>SHA-512 is identical in structure to SHA-256, but: </p> <ul><li>the message is broken into 1024-bit chunks,</li> <li>the initial hash values and round constants are extended to 64 bits,</li> <li>there are 80 rounds instead of 64,</li> <li>the message schedule array w has 80 64-bit words instead of 64 32-bit words,</li> <li>to extend the message schedule array w, the loop is from 16 to 79 instead of from 16 to 63,</li> <li>the round constants are based on the first 80 primes 2..409,</li> <li>the word size used for calculations is 64 bits long,</li> <li>the appended length of the message (before pre-processing), in <i>bits</i>, is a 128-bit big-endian integer, and</li> <li>the shift and rotate amounts used are different.</li></ul> <pre><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA-512 initial hash values (in big-endian):</span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"></span> h[0..7] := 0x6a09e667f3bcc908, 0xbb67ae8584caa73b, 0x3c6ef372fe94f82b, 0xa54ff53a5f1d36f1, 0x510e527fade682d1, 0x9b05688c2b3e6c1f, 0x1f83d9abfb41bd6b, 0x5be0cd19137e2179 <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA-512 round constants:</span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"></span> k[0..79] := 0x428a2f98d728ae22, 0x7137449123ef65cd, 0xb5c0fbcfec4d3b2f, 0xe9b5dba58189dbbc, 0x3956c25bf348b538, 0x59f111f1b605d019, 0x923f82a4af194f9b, 0xab1c5ed5da6d8118, 0xd807aa98a3030242, 0x12835b0145706fbe, 0x243185be4ee4b28c, 0x550c7dc3d5ffb4e2, 0x72be5d74f27b896f, 0x80deb1fe3b1696b1, 0x9bdc06a725c71235, 0xc19bf174cf692694, 0xe49b69c19ef14ad2, 0xefbe4786384f25e3, 0x0fc19dc68b8cd5b5, 0x240ca1cc77ac9c65, 0x2de92c6f592b0275, 0x4a7484aa6ea6e483, 0x5cb0a9dcbd41fbd4, 0x76f988da831153b5, 0x983e5152ee66dfab, 0xa831c66d2db43210, 0xb00327c898fb213f, 0xbf597fc7beef0ee4, 0xc6e00bf33da88fc2, 0xd5a79147930aa725, 0x06ca6351e003826f, 0x142929670a0e6e70, 0x27b70a8546d22ffc, 0x2e1b21385c26c926, 0x4d2c6dfc5ac42aed, 0x53380d139d95b3df, 0x650a73548baf63de, 0x766a0abb3c77b2a8, 0x81c2c92e47edaee6, 0x92722c851482353b, 0xa2bfe8a14cf10364, 0xa81a664bbc423001, 0xc24b8b70d0f89791, 0xc76c51a30654be30, 0xd192e819d6ef5218, 0xd69906245565a910, 0xf40e35855771202a, 0x106aa07032bbd1b8, 0x19a4c116b8d2d0c8, 0x1e376c085141ab53, 0x2748774cdf8eeb99, 0x34b0bcb5e19b48a8, 0x391c0cb3c5c95a63, 0x4ed8aa4ae3418acb, 0x5b9cca4f7763e373, 0x682e6ff3d6b2b8a3, 0x748f82ee5defb2fc, 0x78a5636f43172f60, 0x84c87814a1f0ab72, 0x8cc702081a6439ec, 0x90befffa23631e28, 0xa4506cebde82bde9, 0xbef9a3f7b2c67915, 0xc67178f2e372532b, 0xca273eceea26619c, 0xd186b8c721c0c207, 0xeada7dd6cde0eb1e, 0xf57d4f7fee6ed178, 0x06f067aa72176fba, 0x0a637dc5a2c898a6, 0x113f9804bef90dae, 0x1b710b35131c471b, 0x28db77f523047d84, 0x32caab7b40c72493, 0x3c9ebe0a15c9bebc, 0x431d67c49c100d4c, 0x4cc5d4becb3e42b6, 0x597f299cfc657e2a, 0x5fcb6fab3ad6faec, 0x6c44198c4a475817 <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA-512 Sum & Sigma:</span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"></span> S0 := (a <b>rightrotate</b> 28) <b>xor</b> (a <b>rightrotate</b> 34) <b>xor</b> (a <b>rightrotate</b> 39) S1 := (e <b>rightrotate</b> 14) <b>xor</b> (e <b>rightrotate</b> 18) <b>xor</b> (e <b>rightrotate</b> 41) <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"></span> s0 := (w[i-15] <b>rightrotate</b> 1) <b>xor</b> (w[i-15] <b>rightrotate</b> 8) <b>xor</b> (w[i-15] <b>rightshift</b> 7) s1 := (w[i-2] <b>rightrotate</b> 19) <b>xor</b> (w[i-2] <b>rightrotate</b> 61) <b>xor</b> (w[i-2] <b>rightshift</b> 6) </pre> <p>SHA-384 is identical to SHA-512, except that: </p> <ul><li>the initial hash values <code>h0</code> through <code>h7</code> are different (taken from the 9th through 16th primes), and</li> <li>the output is constructed by omitting <code>h6</code> and <code>h7</code>.</li></ul> <pre><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green">SHA-384 initial hash values (in big-endian):</span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239334494"><span class="tmp-color" style="color:green"></span> h[0..7] := 0xcbbb9d5dc1059ed8, 0x629a292a367cd507, 0x9159015a3070dd17, 0x152fecd8f70e5939, 0x67332667ffc00b31, 0x8eb44a8768581511, 0xdb0c2e0d64f98fa7, 0x47b5481dbefa4fa4 </pre> <p>SHA-512/t is identical to SHA-512 except that: </p> <ul><li>the initial hash values <code>h0</code> through <code>h7</code> are given by the <i>SHA-512/t IV generation function</i>,</li> <li>the output is constructed by truncating the concatenation of <code>h0</code> through <code>h7</code> at <i>t</i> bits,</li> <li><i>t</i> equal to 384 is not allowed, instead SHA-384 should be used as specified, and</li> <li><i>t</i> values 224 and 256 are especially mentioned as approved.</li></ul> <p>The <i>SHA-512/t IV generation function</i> evaluates a <i>modified SHA-512</i> on the ASCII string "SHA-512/<i>t</i>", substituted with the decimal representation of <i>t</i>. The <i>modified SHA-512</i> is the same as SHA-512 except its initial values <code>h0</code> through <code>h7</code> have each been <a href="/wiki/XORed" class="mw-redirect" title="XORed">XORed</a> with the hexadecimal constant <code>0xa5a5a5a5a5a5a5a5</code>. </p><p>Sample C implementation for SHA-2 family of hash functions can be found in <style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style>RFC <a rel="nofollow" class="external text" href="https://datatracker.ietf.org/doc/html/rfc6234">6234</a>. </p> <div class="mw-heading mw-heading2"><h2 id="Comparison_of_SHA_functions">Comparison of SHA functions</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=7" title="Edit section: Comparison of SHA functions"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In the table below, <i>internal state</i> means the "internal hash sum" after each compression of a data block. </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Further information: <a href="/wiki/Merkle%E2%80%93Damg%C3%A5rd_construction" title="Merkle–Damgård construction">Merkle–Damgård construction</a></div> <table class="wikitable" style="margin-top: 0px; width:100%; text-align:center;"> <caption>Comparison of SHA functions <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist" style="float:right"><ul><li class="nv-view"><a href="/wiki/Template:Comparison_of_SHA_functions" title="Template:Comparison of SHA functions"><span title="View this template">view</span></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Comparison_of_SHA_functions" title="Template talk:Comparison of SHA functions"><span title="Discuss this template">talk</span></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Comparison_of_SHA_functions" title="Special:EditPage/Template:Comparison of SHA functions"><span title="Edit this template">edit</span></a></li></ul></div> </caption> <tbody><tr style="vertical-align:bottom;"> <th colspan="2" rowspan="2">Algorithm and variant </th> <th rowspan="2">Output size<br />(bits) </th> <th rowspan="2">Internal <br />state size <br />(bits) </th> <th rowspan="2">Block size<br />(bits) </th> <th rowspan="2">Rounds </th> <th rowspan="2">Operations </th> <th rowspan="2">Security against <a href="/wiki/Collision_attack" title="Collision attack">collision attacks</a> <br />(bits) </th> <th rowspan="2">Security against <a href="/wiki/Length_extension_attack" title="Length extension attack">length extension attacks</a> <br />(bits) </th> <th colspan="2">Performance on <a href="/wiki/Skylake_(microarchitecture)" title="Skylake (microarchitecture)">Skylake</a> (median <a href="/wiki/Cycles_per_byte" class="mw-redirect" title="Cycles per byte">cpb</a>)<sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup> </th> <th rowspan="2">First published </th></tr> <tr style="vertical-align:bottom;"> <th>Long messages </th> <th>8 bytes </th></tr> <tr style="vertical-align:top;"> <td colspan="2"><b><a href="/wiki/MD5" title="MD5">MD5</a></b> (as reference)</td> <td>128</td> <td>128<br /><span class="nowrap">(4 × 32)</span></td> <td>512</td> <td>4 <br /> <span class="nowrap">(16 operations</span> in each round)</td> <td>And, Xor, Or, Rot, <span class="nowrap">Add (mod 2<sup>32</sup>)</span></td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">≤ 18<br />(collisions found)<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup></td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">0</td> <td>4.99</td> <td>55.00</td> <td>1992 </td></tr> <tr style="vertical-align:top;"> <td colspan="2"><b><span class="nowrap"><a href="/wiki/SHA-0" class="mw-redirect" title="SHA-0">SHA-0</a></span></b></td> <td rowspan="2">160</td> <td rowspan="2">160<br /><span class="nowrap">(5 × 32)</span></td> <td rowspan="2">512</td> <td rowspan="2">80</td> <td rowspan="2">And, Xor, Or, Rot, <span class="nowrap">Add (mod 2<sup>32</sup>)</span></td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">< 34<br />(collisions found)</td> <td rowspan="2" style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">0</td> <td>≈ SHA-1</td> <td>≈ SHA-1</td> <td>1993 </td></tr> <tr style="vertical-align:top;"> <td colspan="2"><b><span class="nowrap"><a href="/wiki/SHA-1" title="SHA-1">SHA-1</a></span></b></td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">< 63<br />(collisions found)<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup></td> <td>3.47</td> <td>52.00</td> <td>1995 </td></tr> <tr style="vertical-align:top;"> <td rowspan="4"><b><span class="nowrap"><a class="mw-selflink selflink">SHA-2</a></span></b></td> <td><i>SHA-224</i><br /><i>SHA-256</i></td> <td>224<br />256</td> <td>256<br /><span class="nowrap">(8 × 32)</span></td> <td>512</td> <td>64</td> <td>And, Xor, Or, <br />Rot, Shr, <span class="nowrap">Add (mod 2<sup>32</sup>)</span></td> <td style="background: #BFD; color:black; vertical-align: middle; text-align: center;" class="yes2 table-yes2">112 <br /> 128</td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">32 <br /> 0</td> <td>7.62<br />7.63</td> <td>84.50<br />85.25</td> <td>2004<br />2001 </td></tr> <tr style="vertical-align:top;"> <td><i>SHA-384</i></td> <td>384</td> <td rowspan="3">512<br /><span class="nowrap">(8 × 64)</span></td> <td rowspan="3">1024</td> <td rowspan="3">80</td> <td rowspan="3">And, Xor, Or, <br />Rot, Shr, <span class="nowrap">Add (mod 2<sup>64</sup>)</span></td> <td style="background: #BFD; color:black; vertical-align: middle; text-align: center;" class="yes2 table-yes2">192</td> <td style="background: #BFD; color:black; vertical-align: middle; text-align: center;" class="yes2 table-yes2"><span class="nowrap">128</span></td> <td>5.12</td> <td>135.75</td> <td>2001 </td></tr> <tr style="vertical-align:top;"> <td><i>SHA-512</i></td> <td>512</td> <td style="background: #BFD; color:black; vertical-align: middle; text-align: center;" class="yes2 table-yes2">256</td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">0<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup></td> <td>5.06</td> <td>135.50</td> <td>2001 </td></tr> <tr style="vertical-align:top;"> <td><i><span class="nowrap">SHA-512/224</span></i><br /><i><span class="nowrap">SHA-512/256</span></i></td> <td>224<br />256</td> <td style="background: #BFD; color:black; vertical-align: middle; text-align: center;" class="yes2 table-yes2">112<br />128</td> <td style="background: #BFD; color:black; vertical-align: middle; text-align: center;" class="yes2 table-yes2">288<br />256</td> <td><span class="nowrap">≈ SHA-384</span></td> <td><span class="nowrap">≈ SHA-384</span></td> <td>2012 </td></tr> <tr style="vertical-align:top;"> <td rowspan="2"><b><span class="nowrap"><a href="/wiki/SHA-3" title="SHA-3">SHA-3</a></span></b></td> <td><i>SHA3-224</i><br /><i>SHA3-256</i><br /><i>SHA3-384</i><br /><i>SHA3-512</i></td> <td>224<br />256<br />384<br />512</td> <td rowspan="2">1600<br /><span class="nowrap">(5 × 5 × 64)</span></td> <td>1152<br />1088<br />832<br />576</td> <td rowspan="2"><span class="nowrap">24</span><sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">[</span>45<span class="cite-bracket">]</span></a></sup></td> <td rowspan="2">And, Xor, Rot, Not</td> <td style="background: #BFD; color:black; vertical-align: middle; text-align: center;" class="yes2 table-yes2">112<br />128<br />192<br />256</td> <td style="background: #BFD; color:black; vertical-align: middle; text-align: center;" class="yes2 table-yes2">448<br />512<br />768<br />1024</td> <td>8.12<br />8.59<br />11.06<br />15.88</td> <td>154.25<br />155.50<br />164.00<br />164.00</td> <td rowspan="2">2015 </td></tr> <tr style="vertical-align:top;"> <td><i>SHAKE128</i><br /><i>SHAKE256</i></td> <td><span class="nowrap"><i>d</i> (arbitrary)</span><br /><span class="nowrap"><i>d</i> (arbitrary)</span></td> <td>1344<br />1088</td> <td style="background: #BFD; color:black; vertical-align: middle; text-align: center;" class="yes2 table-yes2">min(<i>d</i>/2, 128)<br /><span class="nowrap">min(<i>d</i>/2, 256)</span></td> <td style="background: #BFD; color:black; vertical-align: middle; text-align: center;" class="yes2 table-yes2"><span class="nowrap">256<br />512</span></td> <td>7.08<br />8.59</td> <td>155.25<br />155.50 </td></tr></tbody></table> <p>In the bitwise operations column, "Rot" stands for <a href="/wiki/Bitwise_operation#Rotate" title="Bitwise operation">rotate no carry</a>, and "Shr" stands for <a href="/wiki/Bitwise_operation#Logical_shift" title="Bitwise operation">right logical shift</a>. All of these algorithms employ <a href="/wiki/Modular_arithmetic#Other_operations" title="Modular arithmetic">modular addition</a> in some fashion except for SHA-3. </p><p>More detailed performance measurements on modern processor architectures are given in the table below. </p> <table class="wikitable"> <tbody><tr> <th>CPU architecture </th> <th>Frequency </th> <th>Algorithm </th> <th>Word size (bits) </th> <th>Cycles/byte <a href="/wiki/X86" title="X86">x86</a> </th> <th>MiB/s x86 </th> <th>Cycles/byte <a href="/wiki/X86-64" title="X86-64">x86-64</a> </th> <th>MiB/s x86-64 </th></tr> <tr style="text-align:center;"> <td rowspan="2"><a href="/wiki/Ivy_Bridge_(microarchitecture)" title="Ivy Bridge (microarchitecture)">Intel Ivy Bridge</a></td> <td rowspan="2">3.5 GHz</td> <td>SHA-256</td> <td>32</td> <td>16.80</td> <td>199</td> <td>13.05</td> <td>256 </td></tr> <tr style="text-align:center;"> <td>SHA-512</td> <td>64</td> <td>43.66</td> <td>76</td> <td>8.48</td> <td>394 </td></tr> <tr style="text-align:center;"> <td rowspan="2"><a href="/wiki/Piledriver_(microarchitecture)" title="Piledriver (microarchitecture)">AMD Piledriver</a> APU</td> <td rowspan="2">3.8 GHz</td> <td>SHA-256</td> <td>32</td> <td>22.87</td> <td>158</td> <td>18.47</td> <td>196 </td></tr> <tr style="text-align:center;"> <td>SHA-512</td> <td>64</td> <td>88.36</td> <td>41</td> <td>12.43</td> <td>292 </td></tr></tbody></table> <p>The performance numbers labeled 'x86' were running using 32-bit code on 64-bit processors, whereas the 'x86-64' numbers are native 64-bit code. While SHA-256 is designed for 32-bit calculations, it does benefit from code optimized for 64-bit processors on the x86 architecture. 32-bit implementations of SHA-512 are significantly slower than their 64-bit counterparts. Variants of both algorithms with different output sizes will perform similarly, since the message expansion and compression functions are identical, and only the initial hash values and output sizes are different. The best implementations of MD5 and SHA-1 perform between 4.5 and 6 cycles per byte on modern processors. </p><p>Testing was performed by the <a href="/wiki/University_of_Illinois_at_Chicago" class="mw-redirect" title="University of Illinois at Chicago">University of Illinois at Chicago</a> on their hydra8 system running an Intel Xeon E3-1275 V2 at a clock speed of 3.5 GHz, and on their hydra9 system running an AMD A10-5800K APU at a clock speed of 3.8 GHz.<sup id="cite_ref-46" class="reference"><a href="#cite_note-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup> The referenced cycles per byte speeds above are the median performance of an algorithm digesting a 4,096 byte message using the SUPERCOP cryptographic benchmarking software.<sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> The MiB/s performance is extrapolated from the CPU clockspeed on a single core; real-world performance will vary due to a variety of factors. </p> <div class="mw-heading mw-heading2"><h2 id="Implementations">Implementations</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=8" title="Edit section: Implementations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Below is a list of cryptography libraries that support SHA-2: </p> <ul><li><a href="/wiki/Botan_(programming_library)" title="Botan (programming library)">Botan</a></li> <li><a href="/wiki/Bouncy_Castle_(cryptography)" title="Bouncy Castle (cryptography)">Bouncy Castle</a></li> <li><a href="/wiki/Cryptlib" title="Cryptlib">Cryptlib</a></li> <li><a href="/wiki/Crypto%2B%2B" title="Crypto++">Crypto++</a></li> <li><a href="/wiki/Libgcrypt" title="Libgcrypt">Libgcrypt</a></li> <li><a href="/wiki/Mbed_TLS" title="Mbed TLS">Mbed TLS</a><sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">[</span>48<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/NaCl_(software)" title="NaCl (software)">libsodium</a></li> <li><a href="/wiki/Nettle_(cryptographic_library)" title="Nettle (cryptographic library)">Nettle</a></li> <li><a href="/wiki/LibreSSL" title="LibreSSL">LibreSSL</a></li> <li><a href="/wiki/OpenSSL" title="OpenSSL">OpenSSL</a></li> <li><a href="/wiki/GnuTLS" title="GnuTLS">GnuTLS</a></li> <li><a href="/wiki/WolfSSL" title="WolfSSL">wolfSSL</a></li></ul> <p>Hardware acceleration is provided by the following processor extensions: </p> <ul><li><a href="/wiki/Intel_SHA_extensions" title="Intel SHA extensions">Intel SHA extensions</a>: Available on some Intel and AMD x86 processors.</li> <li><a href="/wiki/VIA_PadLock" title="VIA PadLock">VIA PadLock</a></li> <li>ARMv8 Cryptography Extensions<sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup></li> <li>IBM <a href="/wiki/Z/Architecture" title="Z/Architecture">z/Architecture</a>: Available since 2005 as part of the Message-Security-Assist Extensions 1 (SHA-256) and 2 (SHA-512)<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup></li> <li>IBM <a href="/wiki/Power_ISA#Power_ISA_v.2.07" title="Power ISA">Power ISA</a> since v.2.07</li></ul> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=9" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-right plainlinks sistersitebox"><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0c/Wikifunctions-logo.svg/40px-Wikifunctions-logo.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/0c/Wikifunctions-logo.svg/60px-Wikifunctions-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/0c/Wikifunctions-logo.svg/80px-Wikifunctions-logo.svg.png 2x" data-file-width="512" data-file-height="513" /></span></span></div> <div class="side-box-text plainlist"><a href="/wiki/Wikifunctions" title="Wikifunctions">Wikifunctions</a> has <b><a href="https://www.wikifunctions.org/wiki/Z10124" class="extiw" title="f:Z10124">a SHA-256 function</a></b>.</div></div> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1235681985"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1237033735"><div class="side-box side-box-right plainlinks sistersitebox"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0c/Wikifunctions-logo.svg/40px-Wikifunctions-logo.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/0c/Wikifunctions-logo.svg/60px-Wikifunctions-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/0c/Wikifunctions-logo.svg/80px-Wikifunctions-logo.svg.png 2x" data-file-width="512" data-file-height="513" /></span></span></div> <div class="side-box-text plainlist"><a href="/wiki/Wikifunctions" title="Wikifunctions">Wikifunctions</a> has <b><a href="https://www.wikifunctions.org/wiki/Z10132" class="extiw" title="f:Z10132">a SHA-384 function</a></b>.</div></div> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1235681985"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1237033735"><div class="side-box side-box-right plainlinks sistersitebox"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0c/Wikifunctions-logo.svg/40px-Wikifunctions-logo.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/0c/Wikifunctions-logo.svg/60px-Wikifunctions-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/0c/Wikifunctions-logo.svg/80px-Wikifunctions-logo.svg.png 2x" data-file-width="512" data-file-height="513" /></span></span></div> <div class="side-box-text plainlist"><a href="/wiki/Wikifunctions" title="Wikifunctions">Wikifunctions</a> has <b><a href="https://www.wikifunctions.org/wiki/Z10067" class="extiw" title="f:Z10067">a SHA-512 function</a></b>.</div></div> </div> <ul><li><a href="/wiki/Comparison_of_cryptographic_hash_functions" title="Comparison of cryptographic hash functions">Comparison of cryptographic hash functions</a></li> <li><a href="/wiki/Comparison_of_cryptography_libraries" title="Comparison of cryptography libraries">Comparison of cryptography libraries</a></li> <li><a href="/wiki/Hash_function_security_summary" title="Hash function security summary">Hash function security summary</a></li> <li><a href="/wiki/Hashcash" title="Hashcash">Hashcash</a></li> <li><a href="/wiki/HMAC" title="HMAC">HMAC</a></li> <li><a href="/wiki/International_Association_for_Cryptologic_Research" title="International Association for Cryptologic Research">International Association for Cryptologic Research</a> (IACR)</li> <li><a href="/wiki/Trusted_timestamping" title="Trusted timestamping">Trusted timestamping</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=10" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-preimage-khov-1"><span class="mw-cite-backlink">^ <a href="#cite_ref-preimage-khov_1-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-preimage-khov_1-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-preimage-khov_1-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDmitry_Khovratovich,_Christian_RechbergerAlexandra_Savelieva2011" class="citation journal cs1">Dmitry Khovratovich, Christian Rechberger & Alexandra Savelieva (2011). <a rel="nofollow" class="external text" href="https://eprint.iacr.org/2011/286.pdf">"Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family"</a> <span class="cs1-format">(PDF)</span>. <i>IACR Cryptology ePrint Archive</i>. <b>2011</b> (286). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220215055932/https://eprint.iacr.org/2011/286.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2022-02-15<span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=IACR+Cryptology+ePrint+Archive&rft.atitle=Bicliques+for+Preimages%3A+Attacks+on+Skein-512+and+the+SHA-2+family&rft.volume=2011&rft.issue=286&rft.date=2011&rft.au=Dmitry+Khovratovich%2C+Christian+Rechberger&rft.au=Alexandra+Savelieva&rft_id=https%3A%2F%2Feprint.iacr.org%2F2011%2F286.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-collision-lamberger-2"><span class="mw-cite-backlink">^ <a href="#cite_ref-collision-lamberger_2-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-collision-lamberger_2-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-collision-lamberger_2-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMario_LambergerFlorian_Mendel2011" class="citation journal cs1">Mario Lamberger & Florian Mendel (2011). <a rel="nofollow" class="external text" href="https://eprint.iacr.org/2011/037.pdf">"Higher-Order Differential Attack on Reduced SHA-256"</a> <span class="cs1-format">(PDF)</span>. <i>IACR Cryptology ePrint Archive</i>. <b>2011</b> (37). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20221222014546/https://eprint.iacr.org/2011/037.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2022-12-22<span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=IACR+Cryptology+ePrint+Archive&rft.atitle=Higher-Order+Differential+Attack+on+Reduced+SHA-256&rft.volume=2011&rft.issue=37&rft.date=2011&rft.au=Mario+Lamberger&rft.au=Florian+Mendel&rft_id=https%3A%2F%2Feprint.iacr.org%2F2011%2F037.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPenardvan_Werkhoven" class="citation web cs1">Penard, Wouter; van Werkhoven, Tim. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160330153520/https://www.staff.science.uu.nl/~werkh108/docs/study/Y5_07_08/infocry/project/Cryp08.pdf">"On the Secure Hash Algorithm family"</a> <span class="cs1-format">(PDF)</span>. <i>staff.science.uu.nl</i>. Archived from <a rel="nofollow" class="external text" href="https://www.staff.science.uu.nl/~werkh108/docs/study/Y5_07_08/infocry/project/Cryp08.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 2016-03-30.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=staff.science.uu.nl&rft.atitle=On+the+Secure+Hash+Algorithm+family&rft.aulast=Penard&rft.aufirst=Wouter&rft.au=van+Werkhoven%2C+Tim&rft_id=https%3A%2F%2Fwww.staff.science.uu.nl%2F~werkh108%2Fdocs%2Fstudy%2FY5_07_08%2Finfocry%2Fproject%2FCryp08.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-:0-4"><span class="mw-cite-backlink">^ <a href="#cite_ref-:0_4-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:0_4-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">Federal Register Notice 02-21599, <a rel="nofollow" class="external text" href="https://federalregister.gov/a/02-21599">Announcing Approval of FIPS Publication 180-2</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220314024321/https://www.federalregister.gov/a/02-21599">Archived</a> 2022-03-14 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-:1-5"><span class="mw-cite-backlink">^ <a href="#cite_ref-:1_5-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:1_5-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://datatracker.ietf.org/ipr/858/">"IPR Details: The United States of America as represented by the National Security Agency's general license statement"</a>. <i>IETF Datatracker</i>. 858. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160616212010/https://datatracker.ietf.org/ipr/858/">Archived</a> from the original on 2016-06-16<span class="reference-accessdate">. Retrieved <span class="nowrap">2008-02-17</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=IETF+Datatracker&rft.atitle=IPR+Details%3A+The+United+States+of+America+as+represented+by+the+National+Security+Agency%27s+general+license+statement&rft_id=https%3A%2F%2Fdatatracker.ietf.org%2Fipr%2F858%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1041539562">.mw-parser-output .citation{word-wrap:break-word}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}</style><span class="citation patent" id="CITEREFLilly2004"><a rel="nofollow" class="external text" href="https://worldwide.espacenet.com/textdoc?DB=EPODOC&IDX=US6829355">US 6829355</a>, Lilly, Glenn M., "Device for and method of one-way cryptographic hashing", published 2004-12-07,  assigned to <a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a></span><span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.number=6829355&rft.cc=US&rft.title=Device+for+and+method+of+one-way+cryptographic+hashing&rft.inventor=Lilly&rft.assignee=%5B%5BNational+Security+Agency%5D%5D&rft.pubdate=2004-12-07"><span style="display: none;"> </span></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf">"FIPS 180-2 with Change Notice 1"</a> <span class="cs1-format">(PDF)</span>. <i>csrc.nist.gov</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170809001643/http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2017-08-09<span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=csrc.nist.gov&rft.atitle=FIPS+180-2+with+Change+Notice+1&rft_id=https%3A%2F%2Fcsrc.nist.gov%2Fpublications%2Ffips%2Ffips180-2%2Ffips180-2withchangenotice.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text">Federal Register Notice E8-24743, <a rel="nofollow" class="external text" href="https://federalregister.gov/a/E8-24743">Announcing Approval of FIPS Publication 180-3</a></span> </li> <li id="cite_note-sp800107-9"><span class="mw-cite-backlink">^ <a href="#cite_ref-sp800107_9-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-sp800107_9-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDang2012" class="citation report cs1">Dang, Quynh (2012-08-24). <a rel="nofollow" class="external text" href="https://csrc.nist.gov/Pubs/sp/800/107/r1/Final">Recommendation for Applications Using Approved Hash Algorithms</a> (Report). National Institute of Standards and Technology. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230828000235/https://csrc.nist.gov/Pubs/sp/800/107/r1/Final">Archived</a> from the original on 2023-08-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-08-28</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=report&rft.btitle=Recommendation+for+Applications+Using+Approved+Hash+Algorithms&rft.pub=National+Institute+of+Standards+and+Technology&rft.date=2012-08-24&rft.aulast=Dang&rft.aufirst=Quynh&rft_id=https%3A%2F%2Fcsrc.nist.gov%2FPubs%2Fsp%2F800%2F107%2Fr1%2FFinal&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-sp80057-10"><span class="mw-cite-backlink">^ <a href="#cite_ref-sp80057_10-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-sp80057_10-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBarkerBarkerBurrPolk2012" class="citation report cs1">Barker, Elaine; Barker, William; Burr, William; Polk, W.; Smid, Miles (2012-07-10). <a rel="nofollow" class="external text" href="https://csrc.nist.gov/Pubs/sp/800/57/pt1/r3/Final">Recommendation for Key Management, Part 1: General (Revision 3)</a> (Report). National Institute of Standards and Technology. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230828000234/https://csrc.nist.gov/Pubs/sp/800/57/pt1/r3/Final">Archived</a> from the original on 2023-08-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-08-28</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=report&rft.btitle=Recommendation+for+Key+Management%2C+Part+1%3A+General+%28Revision+3%29&rft.pub=National+Institute+of+Standards+and+Technology&rft.date=2012-07-10&rft.aulast=Barker&rft.aufirst=Elaine&rft.au=Barker%2C+William&rft.au=Burr%2C+William&rft.au=Polk%2C+W.&rft.au=Smid%2C+Miles&rft_id=https%3A%2F%2Fcsrc.nist.gov%2FPubs%2Fsp%2F800%2F57%2Fpt1%2Fr3%2FFinal&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://csrc.nist.gov/groups/ST/toolkit/examples.html#aHashing">"NIST.gov – Computer Security Division – Computer Security Resource Center"</a>. 29 December 2016. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170909052333/http://csrc.nist.gov/groups/ST/toolkit/examples.html#aHashing">Archived</a> from the original on 9 September 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">15 February</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=NIST.gov+%E2%80%93+Computer+Security+Division+%E2%80%93+Computer+Security+Resource+Center&rft.date=2016-12-29&rft_id=https%3A%2F%2Fcsrc.nist.gov%2Fgroups%2FST%2Ftoolkit%2Fexamples.html%23aHashing&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBarkerRoginsky2011" class="citation report cs1">Barker, Elaine; Roginsky, Allen (2011-01-13). <a rel="nofollow" class="external text" href="https://csrc.nist.gov/Pubs/sp/800/131/a/Final">Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths</a> (Report). National Institute of Standards and Technology. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230828000236/https://csrc.nist.gov/Pubs/sp/800/131/a/Final">Archived</a> from the original on 2023-08-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-08-28</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=report&rft.btitle=Transitions%3A+Recommendation+for+Transitioning+the+Use+of+Cryptographic+Algorithms+and+Key+Lengths&rft.pub=National+Institute+of+Standards+and+Technology&rft.date=2011-01-13&rft.aulast=Barker&rft.aufirst=Elaine&rft.au=Roginsky%2C+Allen&rft_id=https%3A%2F%2Fcsrc.nist.gov%2FPubs%2Fsp%2F800%2F131%2Fa%2FFinal&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text">Federal Register Notice 2012-5400, <a rel="nofollow" class="external text" href="https://federalregister.gov/a/2012-5400">Announcing Approval of FIPS Publication 180-4</a></span> </li> <li id="cite_note-nist.gov-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-nist.gov_14-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://www.nist.gov/itl/csd/sha-100212.cfm">"NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition"</a>. <i>NIST</i>. 2 October 2012. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150402081721/http://www.nist.gov/itl/csd/sha-100212.cfm">Archived</a> from the original on 2 April 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">24 February</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=NIST&rft.atitle=NIST+Selects+Winner+of+Secure+Hash+Algorithm+%28SHA-3%29+Competition&rft.date=2012-10-02&rft_id=https%3A%2F%2Fwww.nist.gov%2Fitl%2Fcsd%2Fsha-100212.cfm&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-franck-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-franck_15-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLucas_Daudt_FranckGabriel_Augusto_GinjaJoão_Paulo_CarmoJose_A._Afonso2024" class="citation journal cs1">Lucas Daudt Franck; Gabriel Augusto Ginja; João Paulo Carmo; Jose A. Afonso; Maximiliam Luppe (2024). <a rel="nofollow" class="external text" href="https://doi.org/10.3390%2Fcomputers13010009">"Custom ASIC Design for SHA-256 Using Open-Source Tools"</a>. <i>Computers</i>. <b>13</b> (1): 9. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.3390%2Fcomputers13010009">10.3390/computers13010009</a></span>. <a href="/wiki/Hdl_(identifier)" class="mw-redirect" title="Hdl (identifier)">hdl</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://hdl.handle.net/1822%2F89307">1822/89307</a></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Computers&rft.atitle=Custom+ASIC+Design+for+SHA-256+Using+Open-Source+Tools&rft.volume=13&rft.issue=1&rft.pages=9&rft.date=2024&rft_id=info%3Ahdl%2F1822%2F89307&rft_id=info%3Adoi%2F10.3390%2Fcomputers13010009&rft.au=Lucas+Daudt+Franck&rft.au=Gabriel+Augusto+Ginja&rft.au=Jo%C3%A3o+Paulo+Carmo&rft.au=Jose+A.+Afonso&rft.au=Maximiliam+Luppe&rft_id=https%3A%2F%2Fdoi.org%2F10.3390%252Fcomputers13010009&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.debian.org/CD/verify">"Verifying authenticity of Debian images"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240219133631/https://www.debian.org/CD/verify">Archived</a> from the original on 2024-02-19<span class="reference-accessdate">. Retrieved <span class="nowrap">2024-02-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Verifying+authenticity+of+Debian+images&rft_id=https%3A%2F%2Fwww.debian.org%2FCD%2Fverify&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMarkoff2009" class="citation news cs1">Markoff, John (2009-01-27). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2009/01/27/science/27arch.html">"A Tool to Verify Digital Records, Even as Technology Shifts"</a>. <i>The New York Times</i>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0362-4331">0362-4331</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230919011821/https://www.nytimes.com/2009/01/27/science/27arch.html">Archived</a> from the original on 2023-09-19<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-08-27</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=A+Tool+to+Verify+Digital+Records%2C+Even+as+Technology+Shifts&rft.date=2009-01-27&rft.issn=0362-4331&rft.aulast=Markoff&rft.aufirst=John&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2009%2F01%2F27%2Fscience%2F27arch.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs1"><a rel="nofollow" class="external text" href="https://datatracker.ietf.org/doc/html/rfc5702"><i>Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC</i></a>. October 2009. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.17487%2FRFC5702">10.17487/RFC5702</a></span>. <a href="/wiki/Request_for_Comments" title="Request for Comments">RFC</a> <a rel="nofollow" class="external text" href="https://datatracker.ietf.org/doc/html/rfc5702">5702</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Use+of+SHA-2+Algorithms+with+RSA+in+DNSKEY+and+RRSIG+Resource+Records+for+DNSSEC&rft.date=2009-10&rft_id=info%3Adoi%2F10.17487%2FRFC5702&rft_id=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc5702&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://akkadia.org/drepper/sha-crypt.html">"Unix crypt with SHA-256/512"</a>. <i>akkadia.org</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230820005802/https://akkadia.org/drepper/sha-crypt.html">Archived</a> from the original on 2023-08-20<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-08-27</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=akkadia.org&rft.atitle=Unix+crypt+with+SHA-256%2F512&rft_id=https%3A%2F%2Fakkadia.org%2Fdrepper%2Fsha-crypt.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBitcoin" class="citation web cs1">Bitcoin, Surplus. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220528202245/https://surplusbitcoin.com/">"Bitcoin Does Not Waste Energy"</a>. <i>Surplus Bitcoin</i>. Archived from <a rel="nofollow" class="external text" href="https://surplusbitcoin.com/">the original</a> on 2022-05-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2020-04-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Surplus+Bitcoin&rft.atitle=Bitcoin+Does+Not+Waste+Energy&rft.aulast=Bitcoin&rft.aufirst=Surplus&rft_id=https%3A%2F%2Fsurplusbitcoin.com%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.mycryptopedia.com/sha-256-related-bitcoin/">"What Is SHA-256 And How Is It Related to Bitcoin? - Mycryptopedia"</a>. <i>Mycryptopedia</i>. 2017-09-21. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180917215259/https://www.mycryptopedia.com/sha-256-related-bitcoin/">Archived</a> from the original on 2018-09-17<span class="reference-accessdate">. Retrieved <span class="nowrap">2018-09-17</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Mycryptopedia&rft.atitle=What+Is+SHA-256+And+How+Is+It+Related+to+Bitcoin%3F+-+Mycryptopedia&rft.date=2017-09-21&rft_id=https%3A%2F%2Fwww.mycryptopedia.com%2Fsha-256-related-bitcoin%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFComputer_Security_Division2017" class="citation web cs1">Computer Security Division, Information Technology Laboratory (2017-01-04). <a rel="nofollow" class="external text" href="https://csrc.nist.gov/projects/hash-functions/nist-policy-on-hash-functions">"NIST Policy on Hash Functions – Hash Functions | CSRC | CSRC"</a>. <i>CSRC | NIST</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230828000235/https://csrc.nist.gov/projects/hash-functions/nist-policy-on-hash-functions">Archived</a> from the original on 2023-08-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-08-27</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=CSRC+%7C+NIST&rft.atitle=NIST+Policy+on+Hash+Functions+%E2%80%93+Hash+Functions+%7C+CSRC+%7C+CSRC&rft.date=2017-01-04&rft.aulast=Computer+Security+Division&rft.aufirst=Information+Technology+Laboratory&rft_id=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2Fhash-functions%2Fnist-policy-on-hash-functions&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110625054822/https://csrc.nist.gov/groups/ST/toolkit/secure_hashing.html">"Secure Hashing"</a>. <i><a href="/wiki/NIST" class="mw-redirect" title="NIST">NIST</a></i>. Archived from <a rel="nofollow" class="external text" href="https://csrc.nist.gov/groups/ST/toolkit/secure_hashing.html">the original</a> on 2011-06-25<span class="reference-accessdate">. Retrieved <span class="nowrap">2010-11-25</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=NIST&rft.atitle=Secure+Hashing&rft_id=https%3A%2F%2Fcsrc.nist.gov%2Fgroups%2FST%2Ftoolkit%2Fsecure_hashing.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20080530175317/https://download.microsoft.com/download/6/8/7/687484ed-8174-496d-8db9-f02b40c12982/Overview%20of%20Windows%20XP%20Service%20Pack%203.pdf">"Overview of Windows XP Service Pack 3"</a> <span class="cs1-format">(PDF)</span>. Microsoft Corporation. Archived from <a rel="nofollow" class="external text" href="https://download.microsoft.com/download/6/8/7/687484ed-8174-496d-8db9-f02b40c12982/Overview%20of%20Windows%20XP%20Service%20Pack%203.pdf">the original</a> <span class="cs1-format">(PDF)</span> on May 30, 2008.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Overview+of+Windows+XP+Service+Pack+3&rft.pub=Microsoft+Corporation&rft_id=https%3A%2F%2Fdownload.microsoft.com%2Fdownload%2F6%2F8%2F7%2F687484ed-8174-496d-8db9-f02b40c12982%2FOverview%2520of%2520Windows%2520XP%2520Service%2520Pack%25203.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://blog.chromium.org/2014/09/gradually-sunsetting-sha-1.html">"Gradually Sunsetting SHA-1"</a>. <i>Chromium Blog</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230807123806/https://blog.chromium.org/2014/09/gradually-sunsetting-sha-1.html">Archived</a> from the original on 2023-08-07<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-08-27</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Chromium+Blog&rft.atitle=Gradually+Sunsetting+SHA-1&rft_id=https%3A%2F%2Fblog.chromium.org%2F2014%2F09%2Fgradually-sunsetting-sha-1.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEric_Mill" class="citation web cs1">Eric Mill. <a rel="nofollow" class="external text" href="https://shaaaaaaaaaaaaa.com/">"SHAAAAAAAAAAAAA"</a>. <i>SHAAAAAAAAAAAAA.com</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170301035323/https://shaaaaaaaaaaaaa.com/">Archived</a> from the original on 2017-03-01<span class="reference-accessdate">. Retrieved <span class="nowrap">2015-08-26</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=SHAAAAAAAAAAAAA.com&rft.atitle=SHAAAAAAAAAAAAA&rft.au=Eric+Mill&rft_id=https%3A%2F%2Fshaaaaaaaaaaaaa.com%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://words.filippo.io/the-unofficial-chrome-sha1-faq/">"The unofficial Chrome SHA1 deprecation FAQ"</a>. <i>Filippo Valsorda</i>. 2015-04-08. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230828000235/https://words.filippo.io/the-unofficial-chrome-sha1-faq/">Archived</a> from the original on 2023-08-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-08-27</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Filippo+Valsorda&rft.atitle=The+unofficial+Chrome+SHA1+deprecation+FAQ&rft.date=2015-04-08&rft_id=https%3A%2F%2Fwords.filippo.io%2Fthe-unofficial-chrome-sha1-faq%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://blogs.windows.com/msedgedev/2016/04/29/sha1-deprecation-roadmap">"An update to our SHA-1 deprecation roadmap – Microsoft Edge Dev BlogMicrosoft Edge Dev Blog"</a>. <i>blogs.windows.com</i>. 29 April 2016. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161128200047/https://blogs.windows.com/msedgedev/2016/04/29/sha1-deprecation-roadmap/">Archived</a> from the original on 2016-11-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2016-11-28</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=blogs.windows.com&rft.atitle=An+update+to+our+SHA-1+deprecation+roadmap+%E2%80%93+Microsoft+Edge+Dev+BlogMicrosoft+Edge+Dev+Blog&rft.date=2016-04-29&rft_id=https%3A%2F%2Fblogs.windows.com%2Fmsedgedev%2F2016%2F04%2F29%2Fsha1-deprecation-roadmap&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFonline2016" class="citation web cs1 cs1-prop-foreign-lang-source">online, heise (2016-01-08). <a rel="nofollow" class="external text" href="https://www.heise.de/news/Firefox-Mozilla-schaltet-SHA-1-ab-und-direkt-wieder-an-3066832.html">"Firefox: Mozilla schaltet SHA-1 ab … und direkt wieder an"</a>. <i>Security</i> (in German). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230828000234/https://www.heise.de/news/Firefox-Mozilla-schaltet-SHA-1-ab-und-direkt-wieder-an-3066832.html">Archived</a> from the original on 2023-08-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-08-27</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Security&rft.atitle=Firefox%3A+Mozilla+schaltet+SHA-1+ab+%E2%80%A6+und+direkt+wieder+an&rft.date=2016-01-08&rft.aulast=online&rft.aufirst=heise&rft_id=https%3A%2F%2Fwww.heise.de%2Fnews%2FFirefox-Mozilla-schaltet-SHA-1-ab-und-direkt-wieder-an-3066832.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text">Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger, <a rel="nofollow" class="external text" href="https://www.win.tue.nl/hashclash/rogue-ca/">MD5 considered harmful today: Creating a rogue CA certificate</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220323052759/https://www.win.tue.nl/hashclash/rogue-ca/">Archived</a> 2022-03-23 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, accessed March 29, 2009.</span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text">Ji Li, Takanori Isobe and Kyoji Shibutani, Sony China Research Laboratory and Sony Corporation, <a rel="nofollow" class="external text" href="https://fse2012.inria.fr/SLIDES/67.pdf">Converting Meet-in-the-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 </a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220224204936/http://fse2012.inria.fr/SLIDES/67.pdf">Archived</a> 2022-02-24 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSanadhyaSarkar2008" class="citation cs2">Sanadhya, Somitra Kumar; Sarkar, Palash (2008), <a rel="nofollow" class="external text" href="https://link.springer.com/chapter/10.1007/978-3-540-89754-5_8"><i>New collision attacks against up to 24-step SHA-2</i></a>, Lecture Notes in Computer Science, vol. 5365, Springer-Verlag, pp. 91–103, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-540-89754-5_8">10.1007/978-3-540-89754-5_8</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-540-89753-8" title="Special:BookSources/978-3-540-89753-8"><bdi>978-3-540-89753-8</bdi></a>, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220121011031/https://link.springer.com/chapter/10.1007%2F978-3-540-89754-5_8">archived</a> from the original on 2022-01-21<span class="reference-accessdate">, retrieved <span class="nowrap">2024-02-12</span></span></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=New+collision+attacks+against+up+to+24-step+SHA-2&rft.series=Lecture+Notes+in+Computer+Science&rft.pages=91-103&rft.pub=Springer-Verlag&rft.date=2008&rft_id=info%3Adoi%2F10.1007%2F978-3-540-89754-5_8&rft.isbn=978-3-540-89753-8&rft.aulast=Sanadhya&rft.aufirst=Somitra+Kumar&rft.au=Sarkar%2C+Palash&rft_id=https%3A%2F%2Flink.springer.com%2Fchapter%2F10.1007%2F978-3-540-89754-5_8&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSanadhyaSarkar2009" class="citation journal cs1">Sanadhya, Somitra Kumar; Sarkar, Palash (2009). <a rel="nofollow" class="external text" href="https://link.springer.com/article/10.1007/s12095-009-0011-5">"A combinatorial analysis of recent attacks on step reduced SHA-2 family"</a>. <i>Cryptography and Communications</i>. <b>1</b> (2): 135–173. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs12095-009-0011-5">10.1007/s12095-009-0011-5</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230802133147/https://link.springer.com/article/10.1007/s12095-009-0011-5">Archived</a> from the original on 2023-08-02<span class="reference-accessdate">. Retrieved <span class="nowrap">2024-02-12</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cryptography+and+Communications&rft.atitle=A+combinatorial+analysis+of+recent+attacks+on+step+reduced+SHA-2+family&rft.volume=1&rft.issue=2&rft.pages=135-173&rft.date=2009&rft_id=info%3Adoi%2F10.1007%2Fs12095-009-0011-5&rft.aulast=Sanadhya&rft.aufirst=Somitra+Kumar&rft.au=Sarkar%2C+Palash&rft_id=https%3A%2F%2Flink.springer.com%2Farticle%2F10.1007%2Fs12095-009-0011-5&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-preimage-merged-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-preimage-merged_34-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKazumaro_AokiJian_GuoKrystian_MatusiewiczYu_Sasaki2009" class="citation book cs1">Kazumaro Aoki; Jian Guo; Krystian Matusiewicz; Yu Sasaki & Lei Wang (2009). "Preimages for Step-Reduced SHA-2". <i>Advances in Cryptology – ASIACRYPT 2009</i>. Lecture Notes in Computer Science. Vol. 5912. Springer Berlin Heidelberg. pp. 578–597. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-642-10366-7_34">10.1007/978-3-642-10366-7_34</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-642-10366-7" title="Special:BookSources/978-3-642-10366-7"><bdi>978-3-642-10366-7</bdi></a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0302-9743">0302-9743</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Preimages+for+Step-Reduced+SHA-2&rft.btitle=Advances+in+Cryptology+%E2%80%93+ASIACRYPT+2009&rft.series=Lecture+Notes+in+Computer+Science&rft.pages=578-597&rft.pub=Springer+Berlin+Heidelberg&rft.date=2009&rft.issn=0302-9743&rft_id=info%3Adoi%2F10.1007%2F978-3-642-10366-7_34&rft.isbn=978-3-642-10366-7&rft.au=Kazumaro+Aoki&rft.au=Jian+Guo&rft.au=Krystian+Matusiewicz&rft.au=Yu+Sasaki&rft.au=Lei+Wang&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-preimage-gou-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-preimage-gou_35-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJian_GuoSan_LingChristian_RechbergerHuaxiong_Wang2010" class="citation book cs1">Jian Guo; San Ling; Christian Rechberger & Huaxiong Wang (2010). "Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2". <a rel="nofollow" class="external text" href="https://eprint.iacr.org/2010/016.pdf"><i>Advances in Cryptology - ASIACRYPT 2010</i></a> <span class="cs1-format">(PDF)</span>. Lecture Notes in Computer Science. Vol. 6477. Springer Berlin Heidelberg. pp. 56–75. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-642-17373-8_4">10.1007/978-3-642-17373-8_4</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-642-17373-8" title="Special:BookSources/978-3-642-17373-8"><bdi>978-3-642-17373-8</bdi></a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0302-9743">0302-9743</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220303171536/https://eprint.iacr.org/2010/016.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2022-03-03<span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Advanced+Meet-in-the-Middle+Preimage+Attacks%3A+First+Results+on+Full+Tiger%2C+and+Improved+Results+on+MD4+and+SHA-2&rft.btitle=Advances+in+Cryptology+-+ASIACRYPT+2010&rft.series=Lecture+Notes+in+Computer+Science&rft.pages=56-75&rft.pub=Springer+Berlin+Heidelberg&rft.date=2010&rft.issn=0302-9743&rft_id=info%3Adoi%2F10.1007%2F978-3-642-17373-8_4&rft.isbn=978-3-642-17373-8&rft.au=Jian+Guo&rft.au=San+Ling&rft.au=Christian+Rechberger&rft.au=Huaxiong+Wang&rft_id=https%3A%2F%2Feprint.iacr.org%2F2010%2F016.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-collision-mendel-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-collision-mendel_36-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFlorian_MendelTomislav_NadMartin_Schläffer2013" class="citation book cs1">Florian Mendel; Tomislav Nad; Martin Schläffer (2013). "Improving Local Collisions: New Attacks on Reduced SHA-256". <a rel="nofollow" class="external text" href="https://online.tugraz.at/tug_online/voe_main2.getvolltext?pCurrPk=69018"><i>Advances in Cryptology – EUROCRYPT 2013</i></a>. Lecture Notes in Computer Science. Vol. 7881. Springer Berlin Heidelberg. pp. 262–278. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-642-38348-9_16">10.1007/978-3-642-38348-9_16</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-642-38348-9" title="Special:BookSources/978-3-642-38348-9"><bdi>978-3-642-38348-9</bdi></a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0302-9743">0302-9743</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20181106192811/https://online.tugraz.at/tug_online/voe_main2.getvolltext?pCurrPk=69018">Archived</a> from the original on 2018-11-06<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-12-13</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Improving+Local+Collisions%3A+New+Attacks+on+Reduced+SHA-256&rft.btitle=Advances+in+Cryptology+%E2%80%93+EUROCRYPT+2013&rft.series=Lecture+Notes+in+Computer+Science&rft.pages=262-278&rft.pub=Springer+Berlin+Heidelberg&rft.date=2013&rft.issn=0302-9743&rft_id=info%3Adoi%2F10.1007%2F978-3-642-38348-9_16&rft.isbn=978-3-642-38348-9&rft.au=Florian+Mendel&rft.au=Tomislav+Nad&rft.au=Martin+Schl%C3%A4ffer&rft_id=https%3A%2F%2Fonline.tugraz.at%2Ftug_online%2Fvoe_main2.getvolltext%3FpCurrPk%3D69018&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-collision-eichlseder-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-collision-eichlseder_37-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMaria_Eichlseder_and_Florian_Mendel_and_Martin_Schläffer2014" class="citation journal cs1">Maria Eichlseder and Florian Mendel and Martin Schläffer (2014). <a rel="nofollow" class="external text" href="https://eprint.iacr.org/2014/302.pdf">"Branching Heuristics in Differential Collision Search with Applications to SHA-512"</a> <span class="cs1-format">(PDF)</span>. <i>IACR Cryptology ePrint Archive</i>. <b>2014</b> (302). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220120220202/https://eprint.iacr.org/2014/302.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2022-01-20<span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=IACR+Cryptology+ePrint+Archive&rft.atitle=Branching+Heuristics+in+Differential+Collision+Search+with+Applications+to+SHA-512&rft.volume=2014&rft.issue=302&rft.date=2014&rft.au=Maria+Eichlseder+and+Florian+Mendel+and+Martin+Schl%C3%A4ffer&rft_id=https%3A%2F%2Feprint.iacr.org%2F2014%2F302.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChristoph_DobraunigMaria_EichlsederFlorian_Mendel2016" class="citation web cs1">Christoph Dobraunig; Maria Eichlseder & Florian Mendel (2016). <a rel="nofollow" class="external text" href="https://eprint.iacr.org/2016/374.pdf">"Analysis of SHA-512/224 and SHA-512/256"</a> <span class="cs1-format">(PDF)</span>. <i>International Association for Cryptologic Research</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170715223048/https://eprint.iacr.org/2016/374.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2017-07-15<span class="reference-accessdate">. Retrieved <span class="nowrap">2016-04-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=International+Association+for+Cryptologic+Research&rft.atitle=Analysis+of+SHA-512%2F224+and+SHA-512%2F256&rft.date=2016&rft.au=Christoph+Dobraunig&rft.au=Maria+Eichlseder&rft.au=Florian+Mendel&rft_id=https%3A%2F%2Feprint.iacr.org%2F2016%2F374.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLiLiuWang2024" class="citation journal cs1">Li, Yingxin; Liu, Fukang; Wang, Gaoli (2024). <a rel="nofollow" class="external text" href="https://eprint.iacr.org/2024/349">"New Records in Collision Attacks on SHA-2"</a>. <i>Cryptology ePrint Archive</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240302224244/https://eprint.iacr.org/2024/349">Archived</a> from the original on 2024-03-02<span class="reference-accessdate">. Retrieved <span class="nowrap">2024-03-02</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cryptology+ePrint+Archive&rft.atitle=New+Records+in+Collision+Attacks+on+SHA-2&rft.date=2024&rft.aulast=Li&rft.aufirst=Yingxin&rft.au=Liu%2C+Fukang&rft.au=Wang%2C+Gaoli&rft_id=https%3A%2F%2Feprint.iacr.org%2F2024%2F349&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170617035122/https://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html">"SHS Validation List"</a>. <i>NIST</i>. 2017-06-16. Archived from <a rel="nofollow" class="external text" href="https://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html">the original</a> on 2017-06-17.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=NIST&rft.atitle=SHS+Validation+List&rft.date=2017-06-16&rft_id=https%3A%2F%2Fcsrc.nist.gov%2Fgroups%2FSTM%2Fcavp%2Fdocuments%2Fshs%2Fshaval.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://bench.cr.yp.to/results-hash.html#amd64-skylake">"Measurements table"</a>. <i>bench.cr.yp.to</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=bench.cr.yp.to&rft.atitle=Measurements+table&rft_id=http%3A%2F%2Fbench.cr.yp.to%2Fresults-hash.html%23amd64-skylake&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTaoLiuFeng2013" class="citation techreport cs1">Tao, Xie; Liu, Fanbao; Feng, Dengguo (2013). <a rel="nofollow" class="external text" href="https://eprint.iacr.org/2013/170.pdf"><i>Fast Collision Attack on MD5</i></a> <span class="cs1-format">(PDF)</span>. <i>Cryptology ePrint Archive</i> (Technical report). <a href="/wiki/International_Association_for_Cryptologic_Research" title="International Association for Cryptologic Research">IACR</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=report&rft.btitle=Fast+Collision+Attack+on+MD5&rft.pub=IACR&rft.date=2013&rft.aulast=Tao&rft.aufirst=Xie&rft.au=Liu%2C+Fanbao&rft.au=Feng%2C+Dengguo&rft_id=https%3A%2F%2Feprint.iacr.org%2F2013%2F170.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStevensBurszteinKarpmanAlbertini" class="citation techreport cs1"><a href="/wiki/Marc_Stevens_(cryptology)" title="Marc Stevens (cryptology)">Stevens, Marc</a>; <a href="/wiki/Elie_Bursztein" title="Elie Bursztein">Bursztein, Elie</a>; Karpman, Pierre; Albertini, Ange; Markov, Yarik. <a rel="nofollow" class="external text" href="https://shattered.io/static/shattered.pdf"><i>The first collision for full SHA-1</i></a> <span class="cs1-format">(PDF)</span> (Technical report). <a href="/wiki/Google" title="Google">Google Research</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=report&rft.btitle=The+first+collision+for+full+SHA-1&rft.pub=Google+Research&rft.aulast=Stevens&rft.aufirst=Marc&rft.au=Bursztein%2C+Elie&rft.au=Karpman%2C+Pierre&rft.au=Albertini%2C+Ange&rft.au=Markov%2C+Yarik&rft_id=https%3A%2F%2Fshattered.io%2Fstatic%2Fshattered.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMarc_StevensElie_BurszteinPierre_KarpmanAnge_Albertini2017" class="citation web cs1">Marc Stevens; Elie Bursztein; Pierre Karpman; Ange Albertini; Yarik Markov; Alex Petit Bianco; Clement Baisse (February 23, 2017). <a rel="nofollow" class="external text" href="https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html">"Announcing the first SHA1 collision"</a>. <i>Google Security Blog</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Google+Security+Blog&rft.atitle=Announcing+the+first+SHA1+collision&rft.date=2017-02-23&rft.au=Marc+Stevens&rft.au=Elie+Bursztein&rft.au=Pierre+Karpman&rft.au=Ange+Albertini&rft.au=Yarik+Markov&rft.au=Alex+Petit+Bianco&rft.au=Clement+Baisse&rft_id=https%3A%2F%2Fsecurity.googleblog.com%2F2017%2F02%2Fannouncing-first-sha1-collision.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></li></ul> </span></li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text">Without truncation, the full internal state of the hash function is known, regardless of collision resistance. If the output is truncated, the removed part of the state must be searched for and found before the hash function can be resumed, allowing the attack to proceed.</span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://keccak.noekeon.org/specs_summary.html">"The Keccak sponge function family"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2016-01-27</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+Keccak+sponge+function+family&rft_id=http%3A%2F%2Fkeccak.noekeon.org%2Fspecs_summary.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-46">^</a></b></span> <span class="reference-text">SUPERCOP Benchmarks <a rel="nofollow" class="external text" href="https://bench.cr.yp.to/results-hash.html">Measurements of hash functions, indexed by machine</a></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://bench.cr.yp.to/supercop.html">"SUPERCOP"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150215055126/http://bench.cr.yp.to/supercop.html">Archived</a> from the original on 15 February 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">24 February</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=SUPERCOP&rft_id=https%3A%2F%2Fbench.cr.yp.to%2Fsupercop.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://tls.mbed.org/supported-ssl-ciphersuites">"<i>Supported SSL / TLS ciphersuites</i>"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190512061037/https://tls.mbed.org/supported-ssl-ciphersuites">Archived</a> from the original on 2019-05-12<span class="reference-accessdate">. Retrieved <span class="nowrap">2019-10-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Supported+SSL+%2F+TLS+ciphersuites&rft_id=https%3A%2F%2Ftls.mbed.org%2Fsupported-ssl-ciphersuites&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/ARMmbed/mbedtls/blob/master/ChangeLog">"<i>Mbed TLS Changelog</i>, 7 July 2007"</a>. <i><a href="/wiki/GitHub" title="GitHub">GitHub</a></i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190204101359/https://github.com/ARMmbed/mbedtls/blob/master/ChangeLog">Archived</a> from the original on 4 February 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">19 October</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=GitHub&rft.atitle=Mbed+TLS+Changelog%2C+7+July+2007&rft_id=https%3A%2F%2Fgithub.com%2FARMmbed%2Fmbedtls%2Fblob%2Fmaster%2FChangeLog&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0500e/CJHDEBAF.html">"ARM Cortex-A53 MPCore Processor Technical Reference Manual Cryptography Extension"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200601095542/http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0500e/CJHDEBAF.html">Archived</a> from the original on 2020-06-01<span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=ARM+Cortex-A53+MPCore+Processor+Technical+Reference+Manual+Cryptography+Extension&rft_id=https%3A%2F%2Finfocenter.arm.com%2Fhelp%2Findex.jsp%3Ftopic%3D%2Fcom.arm.doc.ddi0500e%2FCJHDEBAF.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text">IBM z/Architecture Principles of Operation, publication number SA22-7832. See KIMD and KLMD instructions in Chapter 7.</span> </li> </ol></div> <div class="mw-heading mw-heading2"><h2 id="Further_reading">Further reading</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=11" title="Edit section: Further reading"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239549316">.mw-parser-output .refbegin{margin-bottom:0.5em}.mw-parser-output .refbegin-hanging-indents>ul{margin-left:0}.mw-parser-output .refbegin-hanging-indents>ul>li{margin-left:0;padding-left:3.2em;text-indent:-3.2em}.mw-parser-output .refbegin-hanging-indents ul,.mw-parser-output .refbegin-hanging-indents ul li{list-style:none}@media(max-width:720px){.mw-parser-output .refbegin-hanging-indents>ul>li{padding-left:1.6em;text-indent:-1.6em}}.mw-parser-output .refbegin-columns{margin-top:0.3em}.mw-parser-output .refbegin-columns ul{margin-top:0}.mw-parser-output .refbegin-columns li{page-break-inside:avoid;break-inside:avoid-column}@media screen{.mw-parser-output .refbegin{font-size:90%}}</style><div class="refbegin" style=""> <ul><li>Henri Gilbert, Helena Handschuh: Security Analysis of SHA-256 and Sisters. <a href="/wiki/Selected_Areas_in_Cryptography" title="Selected Areas in Cryptography">Selected Areas in Cryptography</a> 2003: pp175–193</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://www.federalregister.gov/documents/1994/07/11/94-16666/proposed-revision-of-federal-information-processing-standard-fips-180-secure-hash-standard">"Proposed Revision of Federal Information Processing Standard (FIPS) 180, Secure Hash Standard"</a>. <i>Federal Register</i>. <b>59</b> (131): 35317–35318. 1994-07-11. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200728142609/https://www.federalregister.gov/documents/1994/07/11/94-16666/proposed-revision-of-federal-information-processing-standard-fips-180-secure-hash-standard">Archived</a> from the original on 2020-07-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-04-26</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Federal+Register&rft.atitle=Proposed+Revision+of+Federal+Information+Processing+Standard+%28FIPS%29+180%2C+Secure+Hash+Standard&rft.volume=59&rft.issue=131&rft.pages=35317-35318&rft.date=1994-07-11&rft_id=https%3A%2F%2Fwww.federalregister.gov%2Fdocuments%2F1994%2F07%2F11%2F94-16666%2Fproposed-revision-of-federal-information-processing-standard-fips-180-secure-hash-standard&rfr_id=info%3Asid%2Fen.wikipedia.org%3ASHA-2" class="Z3988"></span></li></ul> </div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=SHA-2&action=edit&section=12" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130526224224/https://csrc.nist.gov/groups/STM/cavp/documents/shs/sha256-384-512.pdf">Descriptions of SHA-256, SHA-384, and SHA-512</a> from <a href="/wiki/National_Institute_of_Standards_and_Technology" title="National Institute of Standards and Technology">NIST</a></li> <li><a rel="nofollow" class="external text" href="https://shachecker.com">SHA-2 Checker</a> – SHAChecker to check one's SSL compatibility for SHA-2</li> <li><a rel="nofollow" class="external text" href="https://fe-tool.com/en-us/hash/sha256">SHA-256 Calculator</a> – SHA-256 Calculator</li> <li><a rel="nofollow" class="external text" href="https://owuk.com/sha256.html">SHA-256 Hash Generator</a> – SHA256 Generator – Also serves other critical secure hash algorithms</li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20141008212020/https://w2.eff.org/Privacy/Digital_signature/?f=fips_sha_shs.standard.txt">Specifications for a Secure Hash Standard (SHS)</a> – Draft for proposed SHS (SHA-0)</li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20141008212429/https://w2.eff.org/Privacy/Digital_signature/?f=fips_sha_shs.info.txt">Secure Hash Standard (SHS)</a> – Proposed SHS (SHA-0)</li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110625054822/https://csrc.nist.gov/groups/ST/toolkit/secure_hashing.html">CSRC Cryptographic Toolkit</a> – Official <a href="/wiki/National_Institute_of_Standards_and_Technology" title="National Institute of Standards and Technology">NIST</a> site for the Secure Hash Standard</li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20161126003357/https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">FIPS PUB 180-4: Secure Hash Standard (SHS)</a> (<a href="/wiki/Portable_Document_Format" class="mw-redirect" title="Portable Document Format">PDF</a>, 834 KB) – Current version of the Secure Hash Standard (SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512), August 2015</li> <li><a rel="nofollow" class="external text" href="https://www.cosic.esat.kuleuven.be/nessie/testvectors/hash/sha/index.html">Test vectors for SHA-256/384/512</a> from the <a href="/wiki/NESSIE" title="NESSIE">NESSIE</a> project</li> <li><a rel="nofollow" class="external text" href="https://csrc.nist.gov/groups/STM/cavp/index.html#03">Test vectors for SHA-1, SHA-2</a> from <a href="/wiki/National_Institute_of_Standards_and_Technology" title="National Institute of Standards and Technology">NIST</a> site</li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20100505162618/https://csrc.nist.gov/groups/ST/hash/index.html">NIST Cryptographic Hash Project</a> – SHA-3 competition</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222">RFC <a rel="nofollow" class="external text" href="https://datatracker.ietf.org/doc/html/rfc3874">3874</a>: "A 224-bit One-way Hash Function: SHA-224"</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222">RFC <a rel="nofollow" class="external text" href="https://datatracker.ietf.org/doc/html/rfc6234">6234</a>: "US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)"; contains sample C implementation</li> <li><a rel="nofollow" class="external text" href="https://sha256algorithm.com/">SHA-256 algorithm demonstration</a></li></ul> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"></div><div role="navigation" class="navbox" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks hlist mw-collapsible mw-collapsed navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Cryptography_hash" title="Template:Cryptography hash"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Cryptography_hash" title="Template talk:Cryptography hash"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Cryptography_hash" title="Special:EditPage/Template:Cryptography hash"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Cryptographic_hash_functions_and_message_authentication_codes" style="font-size:114%;margin:0 4em"><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Cryptographic hash functions</a> and <a href="/wiki/Message_authentication_code" title="Message authentication code">message authentication codes</a></div></th></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><a href="/wiki/List_of_hash_functions" title="List of hash functions">List</a></li> <li><a href="/wiki/Comparison_of_cryptographic_hash_functions" title="Comparison of cryptographic hash functions">Comparison</a></li> <li><a href="/wiki/Hash_function_security_summary" title="Hash function security summary">Known attacks</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Common functions</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/MD5" title="MD5">MD5</a> (compromised)</li> <li><a href="/wiki/SHA-1" title="SHA-1">SHA-1</a> (compromised)</li> <li><a class="mw-selflink selflink">SHA-2</a></li> <li><a href="/wiki/SHA-3" title="SHA-3">SHA-3</a></li> <li><a href="/wiki/BLAKE_(hash_function)#BLAKE2" title="BLAKE (hash function)">BLAKE2</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/NIST_hash_function_competition" title="NIST hash function competition">SHA-3 finalists</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/BLAKE_(hash_function)" title="BLAKE (hash function)">BLAKE</a></li> <li><a href="/wiki/Gr%C3%B8stl" title="Grøstl">Grøstl</a></li> <li><a href="/wiki/JH_(hash_function)" title="JH (hash function)">JH</a></li> <li><a href="/wiki/Skein_(hash_function)" title="Skein (hash function)">Skein</a></li> <li><a href="/wiki/SHA-3" title="SHA-3">Keccak</a> (winner)</li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Other functions</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/BLAKE3" class="mw-redirect" title="BLAKE3">BLAKE3</a></li> <li><a href="/wiki/CubeHash" title="CubeHash">CubeHash</a></li> <li><a href="/wiki/Elliptic_curve_only_hash" title="Elliptic curve only hash">ECOH</a></li> <li><a href="/wiki/Fast_syndrome-based_hash" title="Fast syndrome-based hash">FSB</a></li> <li><a href="/wiki/Fugue_(hash_function)" title="Fugue (hash function)">Fugue</a></li> <li><a href="/wiki/GOST_(hash_function)" title="GOST (hash function)">GOST</a></li> <li><a href="/wiki/HAS-160" title="HAS-160">HAS-160</a></li> <li><a href="/wiki/HAVAL" title="HAVAL">HAVAL</a></li> <li><a href="/wiki/Kupyna" title="Kupyna">Kupyna</a></li> <li><a href="/wiki/LSH_(hash_function)" title="LSH (hash function)">LSH</a></li> <li><a href="/wiki/Lane_(hash_function)" title="Lane (hash function)">Lane</a></li> <li><a href="/wiki/MASH-1" title="MASH-1">MASH-1</a></li> <li><a href="/wiki/MASH-1#MASH2" title="MASH-1">MASH-2</a></li> <li><a href="/wiki/MD2_(hash_function)" title="MD2 (hash function)">MD2</a></li> <li><a href="/wiki/MD4" title="MD4">MD4</a></li> <li><a href="/wiki/MD6" title="MD6">MD6</a></li> <li><a href="/wiki/MDC-2" title="MDC-2">MDC-2</a></li> <li><a href="/wiki/N-hash" title="N-hash">N-hash</a></li> <li><a href="/wiki/RIPEMD" title="RIPEMD">RIPEMD</a></li> <li><a href="/wiki/RadioGat%C3%BAn" title="RadioGatún">RadioGatún</a></li> <li><a href="/wiki/SIMD_(hash_function)" title="SIMD (hash function)">SIMD</a></li> <li><a href="/wiki/SM3_(hash_function)" title="SM3 (hash function)">SM3</a></li> <li><a href="/wiki/SWIFFT" title="SWIFFT">SWIFFT</a></li> <li><a href="/wiki/Shabal" title="Shabal">Shabal</a></li> <li><a href="/wiki/Snefru" title="Snefru">Snefru</a></li> <li><a href="/wiki/Streebog" title="Streebog">Streebog</a></li> <li><a href="/wiki/Tiger_(hash_function)" title="Tiger (hash function)">Tiger</a></li> <li><a href="/wiki/Very_smooth_hash" title="Very smooth hash">VSH</a></li> <li><a href="/wiki/Whirlpool_(hash_function)" title="Whirlpool (hash function)">Whirlpool</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Password hashing/<br /><a href="/wiki/Key_stretching" title="Key stretching">key stretching</a> functions</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Argon2" title="Argon2">Argon2</a></li> <li><a href="/wiki/Balloon_hashing" title="Balloon hashing">Balloon</a></li> <li><a href="/wiki/Bcrypt" title="Bcrypt">bcrypt</a></li> <li><a href="/wiki/Catena_(cryptography)" class="mw-redirect" title="Catena (cryptography)">Catena</a></li> <li><a href="/wiki/Crypt_(C)" title="Crypt (C)">crypt</a></li> <li><a href="/wiki/LAN_Manager#LM_hash_details" title="LAN Manager">LM hash</a></li> <li><a href="/wiki/Lyra2" title="Lyra2">Lyra2</a></li> <li><a href="/wiki/Makwa_(cryptography)" class="mw-redirect" title="Makwa (cryptography)">Makwa</a></li> <li><a href="/wiki/PBKDF2" title="PBKDF2">PBKDF2</a></li> <li><a href="/wiki/Scrypt" title="Scrypt">scrypt</a></li> <li><a href="/wiki/Yescrypt" title="Yescrypt">yescrypt</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">General purpose<br /><a href="/wiki/Key_derivation_function" title="Key derivation function">key derivation functions</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/HKDF" title="HKDF">HKDF</a></li> <li>KDF1/KDF2</li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Message_authentication_code" title="Message authentication code">MAC functions</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/CBC-MAC" title="CBC-MAC">CBC-MAC</a></li> <li><a href="/wiki/Data_Authentication_Algorithm" title="Data Authentication Algorithm">DAA</a></li> <li><a href="/wiki/Galois_Message_Authentication_Code" class="mw-redirect" title="Galois Message Authentication Code">GMAC</a></li> <li><a href="/wiki/HMAC" title="HMAC">HMAC</a></li> <li><a href="/wiki/NMAC" class="mw-redirect" title="NMAC">NMAC</a></li> <li><a href="/wiki/One-key_MAC" title="One-key MAC">OMAC</a>/<a href="/wiki/One-key_MAC" title="One-key MAC">CMAC</a></li> <li><a href="/wiki/PMAC_(cryptography)" title="PMAC (cryptography)">PMAC</a></li> <li><a href="/wiki/Poly1305" title="Poly1305">Poly1305</a></li> <li><a href="/wiki/SipHash" title="SipHash">SipHash</a></li> <li><a href="/wiki/UMAC_(cryptography)" title="UMAC (cryptography)">UMAC</a></li> <li><a href="/wiki/VMAC" title="VMAC">VMAC</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Authenticated_encryption" title="Authenticated encryption">Authenticated<br />encryption</a> modes</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/CCM_mode" title="CCM mode">CCM</a></li> <li><a href="/wiki/ChaCha20-Poly1305" title="ChaCha20-Poly1305">ChaCha20-Poly1305</a></li> <li><a href="/wiki/CWC_mode" title="CWC mode">CWC</a></li> <li><a href="/wiki/EAX_mode" title="EAX mode">EAX</a></li> <li><a href="/wiki/Galois/Counter_Mode" title="Galois/Counter Mode">GCM</a></li> <li><a href="/wiki/IAPM_(mode)" title="IAPM (mode)">IAPM</a></li> <li><a href="/wiki/OCB_mode" title="OCB mode">OCB</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Attacks</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Collision_attack" title="Collision attack">Collision attack</a></li> <li><a href="/wiki/Preimage_attack" title="Preimage attack">Preimage attack</a></li> <li><a href="/wiki/Birthday_attack" title="Birthday attack">Birthday attack</a></li> <li><a href="/wiki/Brute-force_attack" title="Brute-force attack">Brute-force attack</a></li> <li><a href="/wiki/Rainbow_table" title="Rainbow table">Rainbow table</a></li> <li><a href="/wiki/Side-channel_attack" title="Side-channel attack">Side-channel attack</a></li> <li><a href="/wiki/Length_extension_attack" title="Length extension attack">Length extension attack</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Design</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Avalanche_effect" title="Avalanche effect">Avalanche effect</a></li> <li><a href="/wiki/Hash_collision" title="Hash collision">Hash collision</a></li> <li><a href="/wiki/Merkle%E2%80%93Damg%C3%A5rd_construction" title="Merkle–Damgård construction">Merkle–Damgård construction</a></li> <li><a href="/wiki/Sponge_function" title="Sponge function">Sponge function</a></li> <li><a href="/wiki/HAIFA_construction" title="HAIFA construction">HAIFA construction</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Standardization</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/CAESAR_Competition" title="CAESAR Competition">CAESAR Competition</a></li> <li><a href="/wiki/CRYPTREC" title="CRYPTREC">CRYPTREC</a></li> <li><a href="/wiki/NESSIE" title="NESSIE">NESSIE</a></li> <li><a href="/wiki/NIST_hash_function_competition" title="NIST hash function competition">NIST hash function competition</a></li> <li><a href="/wiki/Password_Hashing_Competition" title="Password Hashing Competition">Password Hashing Competition</a></li> <li><a href="/wiki/NSA_Suite_B_Cryptography" title="NSA Suite B Cryptography">NSA Suite B</a></li> <li><a href="/wiki/Commercial_National_Security_Algorithm_Suite" title="Commercial National Security Algorithm Suite">CNSA</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Utilization</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Post-quantum_cryptography#Hash-based_cryptography" title="Post-quantum cryptography">Hash-based cryptography</a></li> <li><a href="/wiki/Merkle_tree" title="Merkle tree">Merkle tree</a></li> <li><a href="/wiki/Message_authentication" title="Message authentication">Message authentication</a></li> <li><a href="/wiki/Proof_of_work" title="Proof of work">Proof of work</a></li> <li><a href="/wiki/Salt_(cryptography)" title="Salt (cryptography)">Salt</a></li> <li><a href="/wiki/Pepper_(cryptography)" title="Pepper (cryptography)">Pepper</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr></tbody></table><div></div></td></tr><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks mw-collapsible mw-collapsed navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Cryptography_navbox" title="Template:Cryptography navbox"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Cryptography_navbox" title="Template talk:Cryptography navbox"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Cryptography_navbox" title="Special:EditPage/Template:Cryptography navbox"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Cryptography" style="font-size:114%;margin:0 4em"><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">General</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/History_of_cryptography" title="History of cryptography">History of cryptography</a></li> <li><a href="/wiki/Outline_of_cryptography" title="Outline of cryptography">Outline of cryptography</a></li> <li><a href="/wiki/Classical_cipher" title="Classical cipher">Classical cipher</a></li> <li><a href="/wiki/Cryptographic_protocol" title="Cryptographic protocol">Cryptographic protocol</a> <ul><li><a href="/wiki/Authentication_protocol" title="Authentication protocol">Authentication protocol</a></li></ul></li> <li><a href="/wiki/Cryptographic_primitive" title="Cryptographic primitive">Cryptographic primitive</a></li> <li><a href="/wiki/Cryptanalysis" title="Cryptanalysis">Cryptanalysis</a></li> <li><a href="/wiki/Cryptocurrency" title="Cryptocurrency">Cryptocurrency</a></li> <li><a href="/wiki/Cryptosystem" title="Cryptosystem">Cryptosystem</a></li> <li><a href="/wiki/Cryptographic_nonce" title="Cryptographic nonce">Cryptographic nonce</a></li> <li><a href="/wiki/Cryptovirology" title="Cryptovirology">Cryptovirology</a></li> <li><a href="/wiki/Hash_function" title="Hash function">Hash function</a> <ul><li><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Cryptographic hash function</a></li> <li><a href="/wiki/Key_derivation_function" title="Key derivation function">Key derivation function</a></li> <li><a href="/wiki/Secure_Hash_Algorithms" title="Secure Hash Algorithms">Secure Hash Algorithms</a></li></ul></li> <li><a href="/wiki/Digital_signature" title="Digital signature">Digital signature</a></li> <li><a href="/wiki/Kleptography" title="Kleptography">Kleptography</a></li> <li><a href="/wiki/Key_(cryptography)" title="Key (cryptography)">Key (cryptography)</a></li> <li><a href="/wiki/Key_exchange" title="Key exchange">Key exchange</a></li> <li><a href="/wiki/Key_generator" title="Key generator">Key generator</a></li> <li><a href="/wiki/Key_schedule" title="Key schedule">Key schedule</a></li> <li><a href="/wiki/Key_stretching" title="Key stretching">Key stretching</a></li> <li><a href="/wiki/Keygen" title="Keygen">Keygen</a></li> <li><a href="/wiki/Template:Cryptography_machines" title="Template:Cryptography machines">Machines</a></li> <li><a href="/wiki/Cryptojacking_malware" class="mw-redirect" title="Cryptojacking malware">Cryptojacking malware</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Random_number_generation" title="Random number generation">Random number generation</a> <ul><li><a href="/wiki/Cryptographically_secure_pseudorandom_number_generator" title="Cryptographically secure pseudorandom number generator">Cryptographically secure pseudorandom number generator</a> (CSPRNG)</li></ul></li> <li><a href="/wiki/Pseudorandom_noise" title="Pseudorandom noise">Pseudorandom noise</a> (PRN)</li> <li><a href="/wiki/Secure_channel" title="Secure channel">Secure channel</a></li> <li><a href="/wiki/Insecure_channel" class="mw-redirect" title="Insecure channel">Insecure channel</a></li> <li><a href="/wiki/Subliminal_channel" title="Subliminal channel">Subliminal channel</a></li> <li><a href="/wiki/Encryption" title="Encryption">Encryption</a></li> <li><a href="/wiki/Decryption" class="mw-redirect" title="Decryption">Decryption</a></li> <li><a href="/wiki/End-to-end_encryption" title="End-to-end encryption">End-to-end encryption</a></li> <li><a href="/wiki/Harvest_now,_decrypt_later" title="Harvest now, decrypt later">Harvest now, decrypt later</a></li> <li><a href="/wiki/Information-theoretic_security" title="Information-theoretic security">Information-theoretic security</a></li> <li><a href="/wiki/Plaintext" title="Plaintext">Plaintext</a></li> <li><a href="/wiki/Codetext" class="mw-redirect" title="Codetext">Codetext</a></li> <li><a href="/wiki/Ciphertext" title="Ciphertext">Ciphertext</a></li> <li><a href="/wiki/Shared_secret" title="Shared secret">Shared secret</a></li> <li><a href="/wiki/Trapdoor_function" title="Trapdoor function">Trapdoor function</a></li> <li><a href="/wiki/Trusted_timestamping" title="Trusted timestamping">Trusted timestamping</a></li> <li><a href="/wiki/Key-based_routing" title="Key-based routing">Key-based routing</a></li> <li><a href="/wiki/Onion_routing" title="Onion routing">Onion routing</a></li> <li><a href="/wiki/Garlic_routing" title="Garlic routing">Garlic routing</a></li> <li><a href="/wiki/Kademlia" title="Kademlia">Kademlia</a></li> <li><a href="/wiki/Mix_network" title="Mix network">Mix network</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Mathematics</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Cryptographic hash function</a></li> <li><a href="/wiki/Block_cipher" title="Block cipher">Block cipher</a></li> <li><a href="/wiki/Stream_cipher" title="Stream cipher">Stream cipher</a></li> <li><a href="/wiki/Symmetric-key_algorithm" title="Symmetric-key algorithm">Symmetric-key algorithm</a></li> <li><a href="/wiki/Authenticated_encryption" title="Authenticated encryption">Authenticated encryption</a></li> <li><a href="/wiki/Public-key_cryptography" title="Public-key cryptography">Public-key cryptography</a></li> <li><a href="/wiki/Quantum_key_distribution" title="Quantum key distribution">Quantum key distribution</a></li> <li><a href="/wiki/Quantum_cryptography" title="Quantum cryptography">Quantum cryptography</a></li> <li><a href="/wiki/Post-quantum_cryptography" title="Post-quantum cryptography">Post-quantum cryptography</a></li> <li><a href="/wiki/Message_authentication_code" title="Message authentication code">Message authentication code</a></li> <li><a href="/wiki/Cryptographically_secure_pseudorandom_number_generator" title="Cryptographically secure pseudorandom number generator">Random numbers</a></li> <li><a href="/wiki/Steganography" title="Steganography">Steganography</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Category:Cryptography" title="Category:Cryptography">Category</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Cryptocurrencies" style="padding:3px"><table class="nowraplinks hlist mw-collapsible mw-collapsed navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Cryptocurrencies" title="Template:Cryptocurrencies"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Cryptocurrencies" title="Template talk:Cryptocurrencies"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Cryptocurrencies" title="Special:EditPage/Template:Cryptocurrencies"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Cryptocurrencies" style="font-size:114%;margin:0 4em"><a href="/wiki/Cryptocurrency" title="Cryptocurrency">Cryptocurrencies</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Technology</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Blockchain" title="Blockchain">Blockchain</a></li> <li><a href="/wiki/Cryptocurrency_tumbler" title="Cryptocurrency tumbler">Cryptocurrency tumbler</a></li> <li><a href="/wiki/Cryptocurrency_wallet" title="Cryptocurrency wallet">Cryptocurrency wallet</a></li> <li><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Cryptographic hash function</a></li> <li><a href="/wiki/Decentralized_finance#Decentralized_exchanges" title="Decentralized finance">Decentralized exchange</a></li> <li><a href="/wiki/Decentralized_finance" title="Decentralized finance">Decentralized finance</a></li> <li><a href="/wiki/Distributed_ledger" title="Distributed ledger">Distributed ledger</a></li> <li><a href="/wiki/Fork_(blockchain)" title="Fork (blockchain)">Fork</a></li> <li><a href="/wiki/Lightning_Network" title="Lightning Network">Lightning Network</a></li> <li><a href="/wiki/MetaMask" title="MetaMask">MetaMask</a></li> <li><a href="/wiki/Non-fungible_token" title="Non-fungible token">Non-fungible token</a></li> <li><a href="/wiki/Smart_contract" title="Smart contract">Smart contract</a></li> <li><a href="/wiki/Web3" title="Web3">Web3</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Consensus_(computer_science)" title="Consensus (computer science)">Consensus</a> mechanisms</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Proof_of_authority" title="Proof of authority">Proof of authority</a></li> <li><a href="/wiki/Proof_of_space" title="Proof of space">Proof of space</a></li> <li><a href="/wiki/Proof_of_stake" title="Proof of stake">Proof of stake</a></li> <li><a href="/wiki/Proof_of_work" title="Proof of work">Proof of work</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Proof_of_work" title="Proof of work">Proof of work</a> currencies</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a class="mw-selflink selflink">SHA-256</a>-based</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bitcoin" title="Bitcoin">Bitcoin</a></li> <li><a href="/wiki/Bitcoin_Cash" title="Bitcoin Cash">Bitcoin Cash</a></li> <li><a href="/wiki/Counterparty_(platform)" title="Counterparty (platform)">Counterparty</a></li> <li><a href="/wiki/LBRY" title="LBRY">LBRY</a></li> <li><a href="/wiki/MazaCoin" title="MazaCoin">MazaCoin</a></li> <li><a href="/wiki/Namecoin" title="Namecoin">Namecoin</a></li> <li><a href="/wiki/Peercoin" title="Peercoin">Peercoin</a></li> <li><a href="/wiki/Titcoin" title="Titcoin">Titcoin</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Ethereum" title="Ethereum">Ethash</a>-based</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Ethereum" title="Ethereum">Ethereum</a> (1.0)</li> <li><a href="/wiki/Ethereum_Classic" title="Ethereum Classic">Ethereum Classic</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Scrypt" title="Scrypt">Scrypt</a>-based</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Auroracoin" title="Auroracoin">Auroracoin</a></li> <li><a href="/wiki/Bitconnect" title="Bitconnect">Bitconnect</a></li> <li><a href="/wiki/Coinye" title="Coinye">Coinye</a></li> <li><a href="/wiki/Dogecoin" title="Dogecoin">Dogecoin</a></li> <li><a href="/wiki/Litecoin" title="Litecoin">Litecoin</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Equihash" title="Equihash">Equihash</a>-based</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bitcoin_Gold" title="Bitcoin Gold">Bitcoin Gold</a></li> <li><a href="/wiki/Zcash" title="Zcash">Zcash</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">RandomX-based</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Monero" title="Monero">Monero</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Dash_(cryptocurrency)#X11" title="Dash (cryptocurrency)">X11</a>-based</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Dash_(cryptocurrency)" title="Dash (cryptocurrency)">Dash</a></li> <li><a href="/wiki/Petro_(cryptocurrency)" class="mw-redirect" title="Petro (cryptocurrency)">Petro</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Other</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/AmbaCoin" title="AmbaCoin">AmbaCoin</a></li> <li><a href="/wiki/Firo_(cryptocurrency)" title="Firo (cryptocurrency)">Firo</a></li> <li><a href="/wiki/IOTA_(technology)" title="IOTA (technology)">IOTA</a></li> <li><a href="/wiki/Nervos_Network" title="Nervos Network">Nervos Network</a></li> <li><a href="/wiki/Primecoin" title="Primecoin">Primecoin</a></li> <li><a href="/wiki/Verge_(cryptocurrency)" title="Verge (cryptocurrency)">Verge</a></li> <li><a href="/wiki/Vertcoin" title="Vertcoin">Vertcoin</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Proof_of_stake" title="Proof of stake">Proof of stake</a> currencies</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Algorand" title="Algorand">Algorand</a></li> <li><a href="/wiki/Avalanche_(blockchain_platform)" title="Avalanche (blockchain platform)">Avalanche</a></li> <li><a href="/wiki/Cardano_(blockchain_platform)" title="Cardano (blockchain platform)">Cardano</a></li> <li><a href="/wiki/EOS.IO" title="EOS.IO">EOS.IO</a></li> <li><a href="/wiki/Ethereum" title="Ethereum">Ethereum</a> (2.0)</li> <li><a href="/wiki/Gridcoin" title="Gridcoin">Gridcoin</a></li> <li><a href="/wiki/Injective_(blockchain)" title="Injective (blockchain)">Injective</a></li> <li><a href="/wiki/Kin_(cryptocurrency)" class="mw-redirect" title="Kin (cryptocurrency)">Kin</a></li> <li><a href="/wiki/Nxt" title="Nxt">Nxt</a></li> <li><a href="/wiki/Peercoin" title="Peercoin">Peercoin</a></li> <li><a href="/wiki/Polkadot_(cryptocurrency)" class="mw-redirect" title="Polkadot (cryptocurrency)">Polkadot</a></li> <li><a href="/wiki/Solana_(blockchain_platform)" title="Solana (blockchain platform)">Solana</a></li> <li><a href="/wiki/Steemit" title="Steemit">Steem</a></li> <li><a href="/wiki/Tezos" title="Tezos">Tezos</a></li> <li><a href="/wiki/The_Open_Network" title="The Open Network">TON</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/ERC-20" class="mw-redirect" title="ERC-20">ERC-20</a> tokens</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Augur_(software)" title="Augur (software)">Augur</a></li> <li><a href="/wiki/Aventus_Protocol" class="mw-redirect" title="Aventus Protocol">Aventus</a></li> <li><a href="/wiki/Brave_(web_browser)#Basic_Attention_Token" title="Brave (web browser)">Basic Attention Token</a></li> <li><a href="/wiki/Chainlink_(blockchain)" title="Chainlink (blockchain)">Chainlink</a></li> <li><a href="/wiki/Kin_(cryptocurrency)" class="mw-redirect" title="Kin (cryptocurrency)">Kin</a></li> <li><a href="/wiki/KodakCoin" title="KodakCoin">KodakCoin</a></li> <li><a href="/wiki/Minds_(social_network)" title="Minds (social network)">Minds</a></li> <li><a href="/wiki/Polygon_(blockchain)" title="Polygon (blockchain)">Polygon</a></li> <li><a href="/wiki/Shiba_Inu_(cryptocurrency)" title="Shiba Inu (cryptocurrency)">Shiba Inu</a></li> <li><a href="/wiki/The_DAO_(organization)" class="mw-redirect" title="The DAO (organization)">The DAO</a></li> <li><a href="/wiki/Tron_(cryptocurrency)" class="mw-redirect" title="Tron (cryptocurrency)">TRON</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Stablecoin" title="Stablecoin">Stablecoins</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Dai_(cryptocurrency)" title="Dai (cryptocurrency)">Dai</a></li> <li><a href="/wiki/Diem_(digital_currency)" title="Diem (digital currency)">Diem</a></li> <li><a href="/wiki/Paxos_Trust_Company#Paxos_Standard" title="Paxos Trust Company">Pax</a></li> <li><a href="/wiki/Terra_(blockchain)" title="Terra (blockchain)">Terra</a></li> <li><a href="/wiki/Tether_(cryptocurrency)" title="Tether (cryptocurrency)">Tether</a></li> <li><a href="/wiki/USD_Coin" title="USD Coin">USD Coin</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Other currencies</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Chia_(cryptocurrency)" title="Chia (cryptocurrency)">Chia</a></li> <li><a href="/wiki/Filecoin" title="Filecoin">Filecoin</a></li> <li><a href="/wiki/Hashgraph" title="Hashgraph">HBAR (Hashgraph)</a></li> <li><a href="/wiki/Helium_Network" title="Helium Network">Helium</a></li> <li><a href="/wiki/Terra_(blockchain)" title="Terra (blockchain)">Luna</a></li> <li><a href="/wiki/MobileCoin" title="MobileCoin">MobileCoin</a></li> <li><a href="/wiki/Nano_(cryptocurrency)" title="Nano (cryptocurrency)">Nano</a></li> <li><a href="/wiki/NEO_(cryptocurrency)" title="NEO (cryptocurrency)">NEO</a></li> <li><a href="/wiki/SafeMoon" title="SafeMoon">SafeMoon</a></li> <li><a href="/wiki/Stellar_(payment_network)" title="Stellar (payment network)">Stellar</a></li> <li><a href="/wiki/WhopperCoin" title="WhopperCoin">WhopperCoin</a></li> <li><a href="/wiki/XRP_Ledger" title="XRP Ledger">XRP Ledger</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/List_of_cryptocurrencies#Inactive_currencies" title="List of cryptocurrencies">Inactive currencies</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bitconnect" title="Bitconnect">BitConnect</a></li> <li><a href="/wiki/Coinye" title="Coinye">Coinye</a></li> <li><a href="/wiki/KodakCoin" title="KodakCoin">KodakCoin</a></li> <li><a href="/wiki/OneCoin" title="OneCoin">OneCoin</a></li> <li><a href="/wiki/Petro_(cryptocurrency)" class="mw-redirect" title="Petro (cryptocurrency)">Petro</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Crypto service companies</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Hyperledger" title="Hyperledger">Hyperledger</a></li> <li><a href="/wiki/IQ.Wiki" class="mw-redirect" title="IQ.Wiki">IQ.Wiki</a></li> <li><a href="/wiki/Quahl" title="Quahl">Initiative Q</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Related topics</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Airdrop_(cryptocurrency)" title="Airdrop (cryptocurrency)">Airdrop</a></li> <li><a href="/wiki/BitLicense" title="BitLicense">BitLicense</a></li> <li><a href="/wiki/Blockchain_game" title="Blockchain game">Blockchain game</a></li> <li><a href="/wiki/Complementary_currency" title="Complementary currency">Complementary currency</a></li> <li><a href="/wiki/Crypto-anarchism" class="mw-redirect" title="Crypto-anarchism">Crypto-anarchism</a></li> <li><a href="/wiki/Cryptocurrency_bubble" title="Cryptocurrency bubble">Cryptocurrency bubble</a></li> <li><a href="/wiki/Cryptocurrency_in_Nigeria" title="Cryptocurrency in Nigeria">Cryptocurrency in Nigeria</a></li> <li><a href="/wiki/Category:Cryptocurrency_scams" title="Category:Cryptocurrency scams">Cryptocurrency scams</a></li> <li><a href="/wiki/Digital_currency" title="Digital currency">Digital currency</a></li> <li><a href="/wiki/Decentralized_autonomous_organization" title="Decentralized autonomous organization">Decentralized autonomous organization</a></li> <li><a href="/wiki/Decentralized_application" title="Decentralized application">Decentralized application</a></li> <li><a href="/wiki/Distributed_ledger_technology_law" title="Distributed ledger technology law">Distributed ledger technology law</a></li> <li><a href="/wiki/Double-spending" title="Double-spending">Double-spending</a></li> <li><a href="/wiki/Environmental_impact_of_cryptocurrencies" class="mw-redirect" title="Environmental impact of cryptocurrencies">Environmental impact</a></li> <li><a href="/wiki/Initial_coin_offering" title="Initial coin offering">Initial coin offering</a></li> <li><a href="/wiki/Initial_exchange_offering" title="Initial exchange offering">Initial exchange offering</a></li> <li><a href="/wiki/List_of_cryptocurrencies" title="List of cryptocurrencies">List of cryptocurrencies</a></li> <li><a href="/wiki/Token_money" title="Token money">Token money</a></li> <li><a href="/wiki/Virtual_currency" title="Virtual currency">Virtual currency</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <b><a href="/wiki/Category:Cryptocurrencies" title="Category:Cryptocurrencies">Category</a></b></li> <li><span class="noviewer" typeof="mw:File"><span title="Commons page"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/12px-Commons-logo.svg.png" decoding="async" width="12" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/18px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/24px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></span></span> <b><a href="https://commons.wikimedia.org/wiki/Category:Cryptocurrency" class="extiw" title="commons:Category:Cryptocurrency">Commons</a></b></li> <li><span class="noviewer" typeof="mw:File"><span title="List-Class article"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/d/db/Symbol_list_class.svg/16px-Symbol_list_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/d/db/Symbol_list_class.svg/23px-Symbol_list_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/d/db/Symbol_list_class.svg/31px-Symbol_list_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <b><a href="/wiki/List_of_cryptocurrencies" title="List of cryptocurrencies">List</a></b></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Bitcoin" style="padding:3px"><table class="nowraplinks hlist mw-collapsible mw-collapsed navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Bitcoin" title="Template:Bitcoin"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Bitcoin" title="Template talk:Bitcoin"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Bitcoin" title="Special:EditPage/Template:Bitcoin"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Bitcoin" style="font-size:114%;margin:0 4em"><a href="/wiki/Bitcoin" title="Bitcoin">Bitcoin</a></div></th></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><a href="/wiki/History_of_bitcoin" title="History of bitcoin">History</a></li> <li><a href="/wiki/Economics_of_bitcoin" title="Economics of bitcoin">Economics</a></li> <li><a href="/wiki/Legality_of_bitcoin_by_country_or_territory" class="mw-redirect" title="Legality of bitcoin by country or territory">Legal status</a></li> <li><a href="/wiki/Environmental_effects_of_bitcoin" class="mw-redirect" title="Environmental effects of bitcoin">Environmental effects</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">People</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Gavin_Andresen" title="Gavin Andresen">Gavin Andresen</a></li> <li><a href="/wiki/Andreas_Antonopoulos" title="Andreas Antonopoulos">Andreas Antonopoulos</a></li> <li><a href="/wiki/Brian_Armstrong_(CEO)" class="mw-redirect" title="Brian Armstrong (CEO)">Brian Armstrong</a></li> <li><a href="/wiki/Adam_Back" title="Adam Back">Adam Back</a></li> <li><a href="/wiki/Wences_Casares" title="Wences Casares">Wences Casares</a></li> <li><a href="/wiki/Tim_Draper" title="Tim Draper">Tim Draper</a></li> <li><a href="/wiki/Hal_Finney_(computer_scientist)" title="Hal Finney (computer scientist)">Hal Finney</a></li> <li><a href="/wiki/Wei_Dai" title="Wei Dai">Wei Dai</a></li> <li><a href="/wiki/Mark_Karpel%C3%A8s" title="Mark Karpelès">Mark Karpelès</a></li> <li><a href="/wiki/Satoshi_Nakamoto" title="Satoshi Nakamoto">Satoshi Nakamoto</a></li> <li><a href="/wiki/Charlie_Shrem" title="Charlie Shrem">Charlie Shrem</a></li> <li><a href="/wiki/Nick_Szabo" title="Nick Szabo">Nick Szabo</a></li> <li><a href="/wiki/Vitalik_Buterin" title="Vitalik Buterin">Vitalik Buterin</a></li> <li><a href="/wiki/Ross_Ulbricht" title="Ross Ulbricht">Ross Ulbricht</a></li> <li><a href="/wiki/Roger_Ver" title="Roger Ver">Roger Ver</a></li> <li><a href="/wiki/Cody_Wilson" title="Cody Wilson">Cody Wilson</a></li> <li><a href="/wiki/Cameron_Winklevoss" title="Cameron Winklevoss">Cameron Winklevoss</a></li> <li><a href="/wiki/Tyler_Winklevoss" title="Tyler Winklevoss">Tyler Winklevoss</a></li> <li><a href="/wiki/Craig_Steven_Wright" title="Craig Steven Wright">Craig Wright</a></li> <li><a href="/wiki/Dave_Kleiman" title="Dave Kleiman">Dave Kleiman</a></li> <li><a href="/wiki/Jihan_Wu" title="Jihan Wu">Jihan Wu</a></li> <li><a href="/wiki/Erik_Voorhees" title="Erik Voorhees">Erik Voorhees</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Lists</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/List_of_bitcoin_companies" title="List of bitcoin companies">List of bitcoin companies</a></li> <li><a href="/wiki/List_of_bitcoin_forks" title="List of bitcoin forks">List of bitcoin forks</a></li> <li><a href="/wiki/List_of_bitcoin_organizations" title="List of bitcoin organizations">List of bitcoin organizations</a></li> <li><a href="/wiki/List_of_people_in_blockchain_technology" title="List of people in blockchain technology">List of people in blockchain technology</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Technologies</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bitcoin_network" class="mw-redirect" title="Bitcoin network">Bitcoin network</a></li> <li><a href="/wiki/Blockchain" title="Blockchain">Blockchain</a></li> <li><a href="/wiki/Cryptocurrency" title="Cryptocurrency">Cryptocurrency</a></li> <li><a href="/wiki/Cryptocurrency_wallet" title="Cryptocurrency wallet">Cryptocurrency wallet</a></li> <li><a href="/wiki/Bitcoin_ATM" title="Bitcoin ATM">Bitcoin ATM</a></li> <li><a href="/wiki/Elliptic_Curve_Digital_Signature_Algorithm" title="Elliptic Curve Digital Signature Algorithm">ECDSA</a></li> <li><a href="/wiki/Lightning_Network" title="Lightning Network">Lightning Network</a></li> <li><a href="/wiki/Peer-to-peer" title="Peer-to-peer">P2P</a></li> <li><a href="/wiki/Proof_of_work" title="Proof of work">Proof of work</a></li> <li><a href="/wiki/SegWit" title="SegWit">SegWit</a></li> <li><a class="mw-selflink selflink">SHA-2</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/List_of_bitcoin_forks" title="List of bitcoin forks">Forks</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%">Client</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bitcoin_Unlimited" class="mw-redirect" title="Bitcoin Unlimited">Bitcoin Unlimited</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Currency</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bitcoin_Cash" title="Bitcoin Cash">Bitcoin Cash</a></li> <li><a href="/wiki/Bitcoin_Gold" title="Bitcoin Gold">Bitcoin Gold</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">History</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bitcoin_scalability_problem" title="Bitcoin scalability problem">Bitcoin scalability problem</a></li> <li><a href="/wiki/History_of_bitcoin" title="History of bitcoin">History of bitcoin</a></li> <li><a href="/wiki/Bitcoin_buried_in_Newport_landfill" title="Bitcoin buried in Newport landfill">2013 Bitcoin buried in Newport landfill</a></li> <li><a href="/wiki/Cryptocurrency_bubble" title="Cryptocurrency bubble">2018 cryptocurrency crash</a></li> <li><a href="/wiki/2018_Bitcoin_bomb_threats" title="2018 Bitcoin bomb threats">2018 Bitcoin bomb threats</a></li> <li><a href="/wiki/2020_Twitter_account_hijacking" title="2020 Twitter account hijacking">2020 Twitter account hijacking</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Movies</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><i><a href="/wiki/The_Rise_and_Rise_of_Bitcoin" title="The Rise and Rise of Bitcoin">The Rise and Rise of Bitcoin</a></i> (2014 film)</li> <li><i><a href="/wiki/Deep_Web_(film)" title="Deep Web (film)">Deep Web</a></i> (2015 film)</li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Legal entities<br /><small>(not exchanges)</small></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bitcoin_Foundation" title="Bitcoin Foundation">Bitcoin Foundation</a></li> <li><i><a href="/wiki/Bitcoin_Magazine" title="Bitcoin Magazine">Bitcoin Magazine</a></i></li> <li><a href="/wiki/BitGo" title="BitGo">BitGo</a></li> <li><a href="/wiki/Bitmain" title="Bitmain">Bitmain</a></li> <li><a href="/wiki/Canaan_Creative" title="Canaan Creative">Canaan Creative</a></li> <li><a href="/wiki/CoinDesk" title="CoinDesk">CoinDesk</a></li> <li><a href="/wiki/GHash.io" title="GHash.io">GHash.io</a></li> <li><a href="/wiki/Nuri_(company)" title="Nuri (company)">Nuri</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Bitcoin_in_El_Salvador" title="Bitcoin in El Salvador">Bitcoin in El Salvador</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bitcoin_Law" title="Bitcoin Law">Bitcoin Law</a></li> <li><a href="/wiki/Playa_El_Zonte" title="Playa El Zonte">Bitcoin Beach</a></li> <li><a href="/wiki/Bitcoin_City" title="Bitcoin City">Bitcoin City</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow hlist" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Category:Bitcoin" title="Category:Bitcoin">Category</a></li> <li><span class="noviewer" typeof="mw:File"><span title="Commons page"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/12px-Commons-logo.svg.png" decoding="async" width="12" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/18px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/24px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></span></span> <a href="https://commons.wikimedia.org/wiki/Category:Bitcoin" class="extiw" title="commons:Category:Bitcoin">Commons</a></li></ul> </div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐api‐ext.codfw.main‐9884d96b7‐mwf56 Cached time: 20241127001401 Cache expiry: 344761 Reduced expiry: true Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 0.985 seconds Real time usage: 1.271 seconds Preprocessor visited node count: 7034/1000000 Post‐expand include size: 261723/2097152 bytes Template argument size: 11017/2097152 bytes Highest expansion depth: 23/100 Expensive parser function count: 7/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 237878/5000000 bytes Lua time usage: 0.526/10.000 seconds Lua memory usage: 7472181/52428800 bytes Number of Wikibase entities loaded: 0/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1007.357 1 -total 39.25% 395.365 1 Template:Reflist 13.04% 131.350 2 Template:Infobox 11.51% 115.952 1 Template:SHA-box 11.31% 113.899 8 Template:Cite_journal 10.64% 107.218 24 Template:Cite_web 10.64% 107.169 8 Template:Navbox 8.90% 89.652 1 Template:Short_description 5.98% 60.191 1 Template:Cryptography_navbox 4.63% 46.635 3 Template:IETF_RFC --> <!-- Saved in parser cache with key enwiki:pcache:idhash:1638777-0!canonical and timestamp 20241127001425 and revision id 1259777470. Rendering was triggered because: edit-page --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=SHA-2&oldid=1259777470">https://en.wikipedia.org/w/index.php?title=SHA-2&oldid=1259777470</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Cryptographic_hash_functions" title="Category:Cryptographic hash functions">Cryptographic hash functions</a></li><li><a href="/wiki/Category:Checksum_algorithms" title="Category:Checksum algorithms">Checksum algorithms</a></li><li><a href="/wiki/Category:National_Security_Agency_cryptography" title="Category:National Security Agency cryptography">National Security Agency cryptography</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:CS1_German-language_sources_(de)" title="Category:CS1 German-language sources (de)">CS1 German-language sources (de)</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_matches_Wikidata" title="Category:Short description matches Wikidata">Short description matches Wikidata</a></li><li><a href="/wiki/Category:Articles_containing_potentially_dated_statements_from_2011" title="Category:Articles containing potentially dated statements from 2011">Articles containing potentially dated statements from 2011</a></li><li><a href="/wiki/Category:All_articles_containing_potentially_dated_statements" title="Category:All articles containing potentially dated statements">All articles containing potentially dated statements</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_September_2021" title="Category:Articles with unsourced statements from September 2021">Articles with unsourced statements from September 2021</a></li><li><a href="/wiki/Category:Articles_containing_potentially_dated_statements_from_December_2013" title="Category:Articles containing potentially dated statements from December 2013">Articles containing potentially dated statements from December 2013</a></li><li><a href="/wiki/Category:Articles_with_example_pseudocode" title="Category:Articles with example pseudocode">Articles with example pseudocode</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 27 November 2024, at 00:14<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=SHA-2&mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-669b4ddb54-rsgms","wgBackendResponseTime":138,"wgPageParseReport":{"limitreport":{"cputime":"0.985","walltime":"1.271","ppvisitednodes":{"value":7034,"limit":1000000},"postexpandincludesize":{"value":261723,"limit":2097152},"templateargumentsize":{"value":11017,"limit":2097152},"expansiondepth":{"value":23,"limit":100},"expensivefunctioncount":{"value":7,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":237878,"limit":5000000},"entityaccesscount":{"value":0,"limit":400},"timingprofile":["100.00% 1007.357 1 -total"," 39.25% 395.365 1 Template:Reflist"," 13.04% 131.350 2 Template:Infobox"," 11.51% 115.952 1 Template:SHA-box"," 11.31% 113.899 8 Template:Cite_journal"," 10.64% 107.218 24 Template:Cite_web"," 10.64% 107.169 8 Template:Navbox"," 8.90% 89.652 1 Template:Short_description"," 5.98% 60.191 1 Template:Cryptography_navbox"," 4.63% 46.635 3 Template:IETF_RFC"]},"scribunto":{"limitreport-timeusage":{"value":"0.526","limit":"10.000"},"limitreport-memusage":{"value":7472181,"limit":52428800}},"cachereport":{"origin":"mw-api-ext.codfw.main-9884d96b7-mwf56","timestamp":"20241127001401","ttl":344761,"transientcontent":true}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"SHA-2","url":"https:\/\/en.wikipedia.org\/wiki\/SHA-2","sameAs":"http:\/\/www.wikidata.org\/entity\/Q1968605","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q1968605","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2005-03-23T09:16:49Z","dateModified":"2024-11-27T00:14:00Z","headline":"set of cryptographic hash functions designed by the NSA"}</script> </body> </html>