NIST TechBeat Blue/Yellow Banner NIST logo--go to NIST home page Search NIST web space go to NIST home page go to A-Z subject index Contact NIST skip navigation


NIST Wants Comments on Draft ‘Hash’ Requirements

The National Institute of Standards and Technology (NIST) is planning a competition to develop one or more cryptographic "hash" algorithms to augment and revise the current Secure Hash Standard (Federal Information Processing Standard 180-2). As a first step in this process, NIST is looking for comments on its recently published draft minimum acceptability requirements, submission requirements, and evaluation criteria for candidate algorithms.

Hash algorithms are used widely by the federal government and others in various applications, such as digital signatures and message authentication. FIPS 180-2 specifies five cryptographic hash algorithms -- SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. Because serious attacks have been reported in recent years against cryptographic hash algorithms, including SHA-1, NIST is preparing the groundwork for a more secure hash standard.

For more information on the proposed competition, including a copy of the Federal Register announcement issued today, and to submit comments on the draft hash algorithm requirements and evaluation criteria, see http://www.nist.gov/hash-function. Since the submission requirements and the evaluation criteria may change as a result of the comments that NIST receives, candidate algorithms should not be submitted until the competition is announced later this year.

Media Contact: Jan Kosko, kosko@nist.gov, (301) 975-2767

Return to NIST News page

Date created: 1/23/07