SHA-68

From WikiMD's Wellness Encyclopedia

SHA-68 is a cryptographic hash function that is part of the Secure Hash Algorithms (SHA) series of cryptographic hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). SHA-68 is a theoretical or proposed hash function that has not been officially defined or standardized.

Overview[edit | edit source]

SHA-68, if it were to be defined, would likely be a hash function with an output of 68 bytes, or 544 bits. This would make it larger than SHA-512, the largest defined member of the SHA-2 family, and smaller than SHA3-224, the smallest member of the SHA-3 family. The number 68 in SHA-68 refers to the length of the hash digest produced by the algorithm.

Cryptographic Hash Functions[edit | edit source]

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. It is a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a hash) and is designed to be a one-way function, that is, a function which is infeasible to invert.

Secure Hash Algorithms[edit | edit source]

The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including SHA-1, SHA-2, and SHA-3.

SHA-2[edit | edit source]

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA). They are built using the Merkle–Damgård structure, from a one-way compression function itself built using the Davies–Meyer structure from a (classified) specialized block cipher.

SHA-3[edit | edit source]

SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Unlike SHA-1 and SHA-2, SHA-3 is not an iterative hash function but is based on the Keccak sponge construction, which is fundamentally different from the Merkle–Damgård construction used by SHA-1 and SHA-2.

See Also[edit | edit source]

WikiMD
Navigation: Wellness - Encyclopedia - Health topics - Disease Index‏‎ - Drugs - World Directory - Gray's Anatomy - Keto diet - Recipes

Search WikiMD

Ad.Tired of being Overweight? Try W8MD's physician weight loss program.
Semaglutide (Ozempic / Wegovy and Tirzepatide (Mounjaro / Zepbound) available.
Advertise on WikiMD

WikiMD's Wellness Encyclopedia

Let Food Be Thy Medicine
Medicine Thy Food - Hippocrates

WikiMD is not a substitute for professional medical advice. See full disclaimer.
Credits:Most images are courtesy of Wikimedia commons, and templates Wikipedia, licensed under CC BY SA or similar.

Contributors: Prab R. Tumpati, MD