Secure Hash Algorithm (SHA)

Secure Hash Algorithms

The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST). These include FIPS PUB 180, 180-1, 180-2 and Draft FIPS Publication 202. They are used to create secure hashes for data authentication.

2 courses cover this concept

CS 255: Introduction to Cryptography

Stanford University

Winter 2023

This course offers an introduction to cryptographic techniques used in computer security, covering encryption, message integrity, digital signatures, key management, and more. It is suitable for advanced undergraduates and masters students with some proof techniques and programming experience.

No concepts data

+ 55 more concepts

CSCI 1515 Applied Cryptography

Brown University

Spring 2023

Applied Cryptography at Brown University offers a practical take on securing systems. By learning foundational cryptographic algorithms and advanced topics like zero-knowledge proofs and post-quantum cryptography, students gain both theoretical insights and hands-on experience in implementing cryptosystems using C++ and crypto libraries. Label: State-of-art concepts.

No concepts data

+ 63 more concepts