亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? fips180.txt

?? 應用密碼學密碼算法源代碼 應用密碼學密碼算法源代碼
?? TXT
字號:
                                                     FIPS PUB 180

                                              FEDERAL INFORMATION
                                 PROCESSING STANDARDS PUBLICATION

                                                    1993 May 11  

U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology

                      SECURE HASH STANDARD

   /*** NOTE: NOT OFFICIAL. HARD COPY IS THE OFFICIAL VERSION.
        ^ is used for exponentiation or superscript. ***/

                  CATEGORY:  COMPUTER SECURITY

    U.S. DEPARTMENT OF COMMERCE, Barbara Franklin, Secretary
         NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

                               Foreword

   The Federal Information Processing Standards Publication Series
of the National Institute of Standards and Technology (NIST) is the
official series of publications relating to standards and
guidelines adopted and promulgated under the provisions of Section
111(d) of the Federal Property and Administrative Services Act of
1949 as amended by the Computer Security Act of 1987, Public Law
100-235.  These mandates have given the Secretary of Commerce and
NIST important responsibilities for improving the utilization and
management of computer and related telecommunications systems in
the Federal Government.  The NIST, through the Computer Systems
Laboratory, provides leadership, technical guidance, and
coordination of Government efforts in the development of standards
and guidelines in these areas. 

   Comments concerning Federal Information Processing Standards
Publications are welcomed and should be addressed to the Director,
Computer Systems Laboratory, National Institute of Standards and
Technology, Gaithersburg, MD 20899.

                           James H. Burrows, Director
                           Computer Systems Laboratory 

                               Abstract

   This standard specifies a Secure Hash Algorithm (SHA) which can
be used to generate a condensed representation of a message called
a message digest. The SHA is required for use with the Digital
Signature Algorithm (DSA) as specified in the Digital Signature Standard (DSS)
and whenever a secure hash algorithm is required for federal applications.
The SHA is used by both the transmitter and intended receiver of a message in
computing and verifying a digital signature.

Key words: Computer security, digital signatures,
Federal Information Processing Standard, hash algorithm.

                                                  FIPS PUB 180 

                          Federal Information
                  Processing Standards Publication 180 

                             1993 MAY 11

                            ANNOUNCING THE 

                         SECURE HASH STANDARD

Federal Information Processing Standards Publications (FIPS PUBS)
are issued by the National Institute of Standards and Technology
(NIST) after approval by the Secretary of Commerce pursuant to
Section 111(d) of the Federal Property and Administrative Services
Act of 1949 as amended by the Computer Security Act of 1987, Public
Law 100-235.

Name of Standard: Secure Hash Standard.

Category of Standard: Computer Security.

Explanation: This Standard specifies a Secure Hash Algorithm (SHA) 
for computing a condensed representation of a message or a data file. When a 
message of any length < 2^64 bits is input, the SHA produces a 160-bit output 
called a message digest.  The message digest can
then be input to the Digital Signature Algorithm (DSA) which generates or 
verifies the signature for the message (see Figure 1).  Signing the 
message digest rather than the message often
improves the efficiency of the process because the message digest is 
usually much smaller in size than the message.  The same hash algorithm 
must be used by the verifier of a digital signature
as was used by the creator of the digital signature.  The SHA is called secure 
because it is computationally infeasible to find a message which corresponds 
to a given message digest, or to find two different messages which produce the 
same message digest.  Any change to a message
in transit will, with very high probability, result in a different message 
digest, and the signature will fail to verify.  The SHA is based on principles 
similar to those used by Professor Ronald L. Rivest of MIT when designing 
the MD4 message digest algorithm ("The MD4 Message Digest 
Algorithm," Advances in Cryptology - CRYPTO '90 Proceedings, 
Springer-Verlag, 1991, pp. 303-311), and is 
closely modelled after that algorithm.

Approving Authority: Secretary of Commerce.

Maintenance  Agency:  U.S. Department of Commerce,
National Institute of Standards and Technology, Computer Systems Laboratory.

Applicability: This standard is applicable to all Federal
departments and agencies for the protection of unclassified
information that is not subject to section 2315 of Title 10, United
States Code, or section 3502(2) of Title 44, United States Code. 
This standard is required for use with the Digital Signature Algorithm
(DSA) as specified in the Digital Signature Standard (DSS)
and whenever a secure hash algorithm is required for
federal applications.  Private and commercial organizations are
encouraged to adopt and use this standard. 

Applications: The SHA may be used with the DSA in electronic mail, 
electronic funds transfer, software distribution, data storage, and other 
applications which require data integrity assurance
and data origin authentication.  The SHA may also be used whenever it is 
necessary to generate a condensed version of a message.

Implementations: The SHA may be implemented in software, firmware,
hardware, or any combination thereof.  Only implementations of the
SHA that are validated by NIST will be considered as complying with
this standard.  Information about the requirements for validating
implementations of this standard can be obtained from the National
Institute of Standards and Technology, Computer Systems Laboratory,
Attn: SHS Validation, Gaithersburg, MD 20899.

Export Control: Implementations of this standard are subject to
Federal Government export controls as specified in Title 15, Code
of Federal Regulations, Parts 768 through 799.  Exporters are
advised to contact the Department of Commerce, Bureau of Export
Administration for more information.

Patents: Implementations of the SHA in this standard may be covered
by U.S. and foreign patents.

Implementation Schedule: This standard becomes effective October 15, 1993. 

Specifications: Federal Information Processing Standard (FIPS 180)
Secure Hash Standard (affixed).

Cross Index:

   a. FIPS PUB 46-1, Data Encryption Standard.

   b. FIPS PUB 73, Guidelines for Security of Computer Applications.

   c. FIPS PUB 140-1, Security Requirements for Cryptographic Modules.

   d. FIPS PUB XX, Digital Signature Standard.

Qualifications: While it is the intent of this standard to specify
a secure hash algorithm, conformance to this standard does not
assure that a particular implementation is secure.  The responsible
authority in each agency or department shall assure that an overall
implementation provides an acceptable level of security.  This
standard will be reviewed every five years in order to assess its
adequacy.

Waiver Procedure: Under certain exceptional circumstances, the
heads of Federal departments and agencies may approve waivers to
Federal Information Processing Standards (FIPS).  The head of such
agency may redelegate such authority only to a senior official
designated pursuant to section 3506(b) of Title 44, United States
Code.  Waiver shall be granted only when:

   a. Compliance with a standard would adversely affect the       
      accomplishment of the mission of an operator of a Federal   
      computer system; or

   b. Compliance with a standard would cause a major adverse
      financial impact on the operator which is not offset by
      Government-wide savings.

Agency heads may act upon a written waiver request containing the
information detailed above.  Agency heads may also act without a
written waiver request when they determine that conditions for
meeting the standard cannot be met.  Agency heads may approve
waivers only by a written decision which explains the basis on
which the agency head made the required finding(s).  A copy of
each decision, with procurement sensitive or classified portions
clearly identified, shall be sent to: National Institute of
Standards and Technology; ATTN: FIPS Waiver Decisions, Technology
Building, Room B-154, Gaithersburg, MD 20899.

In addition, notice of each waiver granted and each delegation of
authority to approve waivers shall be sent promptly to the
Committee on Government Operations of the House of Representatives
and the Committee on Government Affairs of the Senate and shall be
published promptly in the Federal Register.

When the determination on a waiver applies to the procurement of
equipment and/or services, a notice of the waiver determination
must be published in the Commerce Business Daily as a part of the
notice of solicitation for offers of an acquisition or, if the
waiver determination is made after that notice is published, by
amendment to such notice.

A copy of the waiver, any supporting documents, the document
approving the waiver and any accompanying documents, with such
deletions as the agency is authorized and decides to make under 5
United States Code Section 552(b), shall be part of the procurement
documentation and retained by the agency.

Where to Obtain Copies of the Standard: Copies of this publication
are for sale by the National Technical Information Service, U.S.
Department of Commerce, Springfield, VA 22161.  When ordering,
refer to Federal Information Processing Standards Publication 180 
(FIPS PUB  180), and identify the title.  When microfiche is desired,
this should be specified.  Prices are published by NTIS in current
catalogs and other issuances.  Payment may be made by check, money
order, deposit account or charged to a credit card accepted by
NTIS.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91网页版在线| 99久久夜色精品国产网站| 韩国v欧美v日本v亚洲v| 成人黄色小视频| 欧美tickling挠脚心丨vk| 一区二区中文字幕在线| 国内精品久久久久影院色| 在线亚洲人成电影网站色www| 久久综合九色综合97婷婷女人| 一区二区三区在线播| 972aa.com艺术欧美| 亚洲欧洲日本在线| 成人在线视频首页| 精品第一国产综合精品aⅴ| 午夜精品福利一区二区三区av| 在线看国产一区二区| 亚洲精品国产无套在线观| 97国产一区二区| 亚洲一区二区综合| 4438x成人网最大色成网站| 亚洲国产aⅴ成人精品无吗| 日韩欧美不卡在线观看视频| 久久99蜜桃精品| 国产精品伦理一区二区| 欧美性猛片xxxx免费看久爱| 香蕉成人伊视频在线观看| 日韩欧美国产1| 91首页免费视频| 艳妇臀荡乳欲伦亚洲一区| 欧美性受xxxx| 成人免费毛片aaaaa**| 婷婷开心久久网| 国产精品久久久久久久久搜平片| 91蝌蚪国产九色| 日本三级亚洲精品| 亚洲精品乱码久久久久久黑人| 欧美日韩国产成人在线91| 国产在线播放一区三区四| 亚洲另类色综合网站| 欧美一级二级三级蜜桃| 成人少妇影院yyyy| 狠狠狠色丁香婷婷综合激情 | 欧美日韩三级视频| 国产成人精品影视| 日韩av网站在线观看| 一区二区三区欧美日韩| 久久久久久久国产精品影院| 欧美日韩国产小视频| 91影院在线免费观看| 高清成人免费视频| 国产综合成人久久大片91| 奇米影视在线99精品| 亚洲国产精品久久人人爱蜜臀| 日本一区二区综合亚洲| 久久亚洲精品小早川怜子| 欧美精选一区二区| 欧美久久久久久久久中文字幕| 99v久久综合狠狠综合久久| 成人爽a毛片一区二区免费| 成人午夜视频福利| 色悠悠久久综合| 欧美色男人天堂| 欧美精品第1页| 久久久影视传媒| 成人欧美一区二区三区在线播放| 国产精品久久久久久久久免费相片| 国产精品国产馆在线真实露脸| 国产精品视频你懂的| 亚洲精品国产一区二区三区四区在线 | 日本精品一级二级| 欧美午夜精品免费| 欧美成人bangbros| 亚洲人午夜精品天堂一二香蕉| 亚洲国产精品麻豆| 国产乱淫av一区二区三区 | 精品国产亚洲在线| 亚洲一区电影777| 高清不卡在线观看| 欧美精品在线观看播放| 亚洲色图制服诱惑| 国产精品夜夜嗨| 精品免费国产二区三区| 亚洲一二三四区| 成人av在线播放网址| 久久视频一区二区| 天堂久久久久va久久久久| 色综合天天视频在线观看| 日韩欧美一级特黄在线播放| 一区二区三区四区乱视频| 丁香婷婷综合色啪| 国产情人综合久久777777| 国产精品一区二区在线观看不卡 | 91精品国产综合久久久蜜臀粉嫩| 亚洲婷婷国产精品电影人久久| 麻豆成人久久精品二区三区红 | 国产精一区二区三区| 久久亚区不卡日本| 国产又粗又猛又爽又黄91精品| 日韩无一区二区| 韩国精品主播一区二区在线观看| 欧美亚洲高清一区| 亚洲激情在线激情| 91精品国产91久久综合桃花| 丝袜美腿亚洲一区二区图片| 欧美一区二区三区免费观看视频| 丝袜美腿成人在线| 精品国产露脸精彩对白| 色综合久久天天综合网| 天天综合网 天天综合色| 91精品蜜臀在线一区尤物| 国产一区二区三区免费看| 中文字幕一区av| 欧美电影一区二区| 99久久99久久精品免费观看| 亚洲国产精品久久久久秋霞影院| 欧美肥大bbwbbw高潮| 国产精品69毛片高清亚洲| 亚洲第一成年网| 亚洲丝袜制服诱惑| 精品国产99国产精品| 欧美日韩亚洲国产综合| 成人午夜视频免费看| 日韩经典中文字幕一区| 国产精品国产三级国产三级人妇| 在线观看亚洲a| 极品美女销魂一区二区三区| 国产精品久久久久久久久快鸭 | 亚洲图片欧美一区| 亚洲女性喷水在线观看一区| 精品欧美一区二区在线观看| 91亚洲永久精品| 成人av免费观看| gogo大胆日本视频一区| 国产一区二区在线看| 青青草97国产精品免费观看 | 亚洲天堂网中文字| 亚洲精品老司机| 亚洲成人激情自拍| 日本麻豆一区二区三区视频| 日产国产欧美视频一区精品 | 欧美韩国日本一区| 国产日韩欧美一区二区三区乱码 | 欧美久久久久久蜜桃| 日韩三级免费观看| 91精品国产色综合久久不卡电影| 欧美日韩中文字幕精品| 日韩视频一区二区三区 | 午夜成人免费电影| 免费的成人av| 成人午夜激情影院| 91久久精品网| 日韩亚洲欧美中文三级| 精品91自产拍在线观看一区| 国产日产欧美一区二区三区| 国产精品久久网站| 免费在线观看日韩欧美| 成人动漫一区二区| 91精品国产色综合久久| 国产精品电影一区二区三区| 蜜臀av一区二区在线观看| 在线影院国内精品| 亚洲精品日日夜夜| 麻豆精品视频在线观看免费| 色综合天天综合在线视频| 精品捆绑美女sm三区| 日本美女视频一区二区| 日本伦理一区二区| 日韩伦理电影网| 成人激情av网| 中文子幕无线码一区tr| 免费在线成人网| 日韩欧美国产精品| 日韩福利视频导航| 欧美一区二区私人影院日本| 日韩精品午夜视频| 欧美精品高清视频| 老汉av免费一区二区三区| 精品精品国产高清a毛片牛牛 | 99久久国产综合色|国产精品| 欧美一区二区三区不卡| 蜜桃精品视频在线| 日韩一级高清毛片| 久久国产精品一区二区| 久久久久久9999| 91国在线观看| 日韩精品福利网| 国产日韩高清在线| 欧美精品自拍偷拍| 国产91精品一区二区麻豆网站| 国产精品动漫网站| 91精品国产综合久久精品图片| 国产一区二区在线视频| 国产精品久久久久9999吃药| 在线精品视频一区二区三四| 国模套图日韩精品一区二区| 亚洲欧美日韩中文字幕一区二区三区| 在线观看一区二区视频| 韩国成人精品a∨在线观看| 亚洲一区二区三区自拍| 欧美激情综合网|