Secure Hash Standard (SHS) : FIPS PUB 180-4
Secure Hash Standard (SHS) : FIPS PUB 180-4
Secure Hash Standard (SHS) : FIPS PUB 180-4
March 2012
The Federal Information Processing Standards Publication Series of the National Institute
of Standards and Technology (NIST) is the official series of publications relating to
standards and guidelines adopted and promulgated under the provisions of the Federal
Information Security Management Act (FISMA) of 2002.
Comments concerning FIPS publications are welcomed and should be addressed to the
Director, Information Technology Laboratory, National Institute of Standards and
Technology, 100 Bureau Drive, Stop 8900, Gaithersburg, MD 20899-8900.
Charles H. Romine, Director
Information Technology Laboratory
ii
Abstract
This standard specifies hash algorithms that can be used to generate digests of messages.
The digests are used to detect whether messages have been changed since the digests
were generated.
Key words: computer security, cryptography, message digest, hash function, hash
algorithm, Federal Information Processing Standards, Secure Hash Standard.
iii
Federal Information
March 2012
Announcing the
Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National
Institute of Standards and Technology (NIST) after approval by the Secretary of Commerce
pursuant to Section 5131 of the Information Technology Management Reform Act of 1996
(Public Law 104-106), and the Computer Security Act of 1987 (Public Law 100-235).
3. Explanation: This Standard specifies secure hash algorithms - SHA-1, SHA-224, SHA-256,
SHA-384, SHA-512, SHA-512/224 and SHA-512/256 - for computing a condensed
representation of electronic data (message). When a message of any length less than 264 bits (for
SHA-1, SHA-224 and SHA-256) or less than 2128 bits (for SHA-384, SHA-512, SHA-512/224
and SHA-512/256) is input to a hash algorithm, the result is an output called a message digest.
The message digests range in length from 160 to 512 bits, depending on the algorithm. Secure
hash algorithms are typically used with other cryptographic algorithms, such as digital signature
algorithms and keyed-hash message authentication codes, or in the generation of random
numbers (bits).
The hash algorithms specified in this Standard are called secure because, for a given algorithm, it
is computationally infeasible 1) to find a message that corresponds to a given message digest, or
2) to find two different messages that produce the same message digest. Any change to a
message will, with a very high probability, result in a different message digest. This will result in
a verification failure when the secure hash algorithm is used with a digital signature algorithm or
a keyed-hash message authentication algorithm.
iv
6. Applicability: This Standard is applicable to all Federal departments and agencies for the
protection of sensitive unclassified information that is not subject to Title 10 United States Code
Section 2315 (10 USC 2315) and that is not within a national security system as defined in Title
44 United States Code Section 3502(2) (44 USC 3502(2)). This standard shall be implemented
whenever a secure hash algorithm is required for Federal applications, including use by other
cryptographic algorithms and protocols. The adoption and use of this Standard is available to
private and commercial organizations.
7. Specifications: Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard
(SHS) (affixed).
9. Implementation Schedule: Guidance regarding the testing and validation to FIPS 180-4 and
its relationship to FIPS 140-2 can be found in IG 1.10 of the Implementation Guidance for FIPS
PUB 140-2 and the Cryptographic Module Validation Program at
http://csrc.nist.gov/groups/STM/cmvp/index.html.
10. Patents: Implementations of the secure hash algorithms in this standard may be covered by
U.S. or foreign patents.
11. Export Control: Certain cryptographic devices and technical data regarding them are
subject to Federal export controls. Exports of cryptographic modules implementing this standard
and technical data regarding them must comply with these Federal regulations and be licensed by
the Bureau of Export Administration of the U.S. Department of Commerce. Information about
export regulations is available at: http://www.bis.doc.gov/index.htm.
12. Qualifications: While it is the intent of this Standard to specify general security
requirements for generating a message digest, conformance to this Standard does not assure that
a particular implementation is secure. The responsible authority in each agency or department
shall assure that an overall implementation provides an acceptable level of security. This
Standard will be reviewed every five years in order to assess its adequacy.
13. Waiver Procedure: The Federal Information Security Management Act (FISMA) does not
allow for waivers to Federal Information Processing Standards (FIPS) that are made mandatory
by the Secretary of Commerce.
14. Where to Obtain Copies of the Standard: This publication is available electronically by
accessing http://csrc.nist.gov/publications/. Other computer security publications are available at
the same web site.
v
Federal Information
Table of Contents
2.2.1 Parameters.............................................................................................................................4
5.3.1 SHA-1...................................................................................................................................14
5.3.3 SHA-256...............................................................................................................................15
5.3.4 SHA-384...............................................................................................................................15
5.3.5 SHA-512...............................................................................................................................15
1. INTRODUCTION
This Standard specifies secure hash algorithms, SHA-1, SHA-224, SHA-256, SHA-384, SHA-
512, SHA-512/224 and SHA-512/256. All of the algorithms are iterative, one-way hash
functions that can process a message to produce a condensed representation called a message
digest. These algorithms enable the determination of a message’s integrity: any change to the
message will, with a very high probability, result in a different message digest. This property is
useful in the generation and verification of digital signatures and message authentication codes,
and in the generation of random numbers or bits.
Each algorithm can be described in two stages: preprocessing and hash computation.
Preprocessing involves padding a message, parsing the padded message into m-bit blocks, and
setting initialization values to be used in the hash computation. The hash computation generates
a message schedule from the padded message and uses that schedule, along with functions,
constants, and word operations to iteratively generate a series of hash values. The final hash
value generated by the hash computation is used to determine the message digest.
The algorithms differ most significantly in the security strengths that are provided for the data
being hashed. The security strengths of these hash functions and the system as a whole when
each of them is used with other cryptographic algorithms, such as digital signature algorithms
and keyed-hash message authentication codes, can be found in [SP 800-57] and [SP 800-107].
Additionally, the algorithms differ in terms of the size of the blocks and words of data that are
used during hashing or message digest sizes. Figure 1 presents the basic properties of these hash
algorithms.
Algorithm Message Size Block Size Word Size Message Digest Size
2. DEFINITIONS
2.1 Glossary of Terms and Acronyms
SP Special Publication
2.2.1 Parameters
The following parameters are used in the secure hash algorithm specifications in this Standard.
a, b, c, …, h Working variables that are the w-bit words used in the computation of the
hash values, H(i).
H (i) The ith hash value. H(0) is the initial hash value; H(N) is the final hash value
and is used to determine the message digest.
H (i)
j
The jth word of the ith hash value, where H 0(i) is the left-most word of hash
value i.
M Message to be hashed.
M (i)
j
The jth word of the ith message block, where M 0(i) is the left-most word of
message block i.
The following operations are used in the secure hash algorithm specifications:
ROTL n(x) The rotate left (circular left shift) operation, where x is a w-bit word and n
is an integer with 0 ≤ n < w, is defined by ROTL n(x)=(x << n) ∨
(x >> w - n).
ROTR n(x) The rotate right (circular right shift) operation, where x is a w-bit word
and n is an integer with 0 ≤ n < w, is defined by ROTR n(x)=(x >> n) ∨
(x << w - n).
SHR n(x) The right shift operation, where x is a w-bit word and n is an integer with 0
≤ n < w, is defined by SHR n(x)=x >> n.
1. A hex digit is an element of the set {0, 1,…, 9, a,…, f}. A hex digit is the
representation of a 4-bit string. For example, the hex digit “7” represents the 4-bit
string “0111”, and the hex digit “a” represents the 4-bit string “1010”.
An integer between 0 and 232-1 inclusive may be represented as a 32-bit word. The
least significant four bits of the integer are represented by the right-most hex digit of
the word representation. For example, the integer 291=28 + 25 + 21 + 20=256+32+2+1
is represented by the hex word “00000123”.
The same holds true for an integer between 0 and 264-1 inclusive, which may be
represented as a 64-bit word.
If Z is an integer, 0 ≤ Z < 264, then Z=232X + Y, where 0 ≤ X < 232 and 0 ≤ Y < 232.
Since X and Y can be represented as 32-bit words x and y, respectively, the integer Z
can be represented as the pair of words (x, y). This property is used for SHA-1, SHA-
224 and SHA-256.
If Z is an integer, 0 ≤ Z < 2128, then Z=264X + Y, where 0 ≤ X < 264 and 0 ≤ Y < 264.
Since X and Y can be represented as 64-bit words x and y, respectively, the integer Z
can be represented as the pair of words (x, y). This property is used for SHA-384,
SHA-512, SHA-512/224 and SHA-512/256.
4. For the secure hash algorithms, the size of the message block - m bits - depends on the
algorithm.
a) For SHA-1, SHA-224 and SHA-256, each message block has 512 bits, which are
represented as a sequence of sixteen 32-bit words.
The operation x + y is defined as follows. The words x and y represent integers X and
Y, where 0 ≤ X < 2w and 0 ≤ Y < 2w. For positive integers U and V, let U modV be
the remainder upon dividing U by V. Compute
Then 0 ≤ Z < 2w. Convert the integer Z to a word, z, and define z=x + y.
3. The right shift operation SHR n(x), where x is a w-bit word and n is an integer with 0
≤ n < w, is defined by
4. The rotate right (circular right shift) operation ROTR n(x), where x is a w-bit word
and n is an integer with 0 ≤ n < w, is defined by
5. The rotate left (circular left shift) operation, ROTL n(x), where x is a w-bit word and n
is an integer with 0 ≤ n < w, is defined by
Ch(x, y, z)=(x ∧ y) ⊕ ( ¬ x ∧ z) 0 ≤ t ≤ 19
Parity(x, y, z)=x ⊕ y ⊕ z 20 ≤ t ≤ 39
ft (x, y, z) = (4.1)
Maj(x, y, z)=(x ∧ y) ⊕ (x ∧ z) ⊕ (y ∧ z) 40 ≤ t ≤ 59
{256}
∑ 0
(x) = ROTR 2(x) ⊕ ROTR 13(x) ⊕ ROTR 22(x) (4.4)
{256}
∑ 1
(x) = ROTR 6(x) ⊕ ROTR 11(x) ⊕ ROTR 25(x) (4.5)
σ {256}
0 ( x) = ROTR 7(x) ⊕ ROTR 18(x) ⊕ SHR 3(x) (4.6)
σ {256}
1 ( x) = ROTR 17(x) ⊕ ROTR 19(x) ⊕ SHR 10(x) (4.7)
10
{512}
∑ 0
(x) = ROTR 28(x) ⊕ ROTR 34(x) ⊕ ROTR 39(x) (4.10)
{512}
∑ 1
(x) = ROTR 14(x) ⊕ ROTR 18(x) ⊕ ROTR 41(x) (4.11)
{512} 1 8 7
σ 0 ( x) = ROTR (x) ⊕ ROTR (x) ⊕ SHR (x) (4.12)
{512} 19 61 6
σ 1 ( x) = ROTR (x) ⊕ ROTR (x) ⊕ SHR (x) (4.13)
4.2 Constants
5a827999 0 ≤ t ≤ 19
6ed9eba1 20 ≤ t ≤ 39
Kt = (4.14)
8f1bbcdc 40 ≤ t ≤ 59
ca62c1d6 60 ≤ t ≤ 79
11
12
5. PREPROCESSING
Preprocessing consists of three steps: padding the message, M (Sec. 5.1), parsing the message
into message blocks (Sec. 5.2), and setting the initial hash value, H(0) (Sec. 5.3).
The length of the padded message should now be a multiple of 512 bits.
The length of the padded message should now be a multiple of 1024 bits.
13
5.3.1 SHA-1
For SHA-1, the initial hash value, H(0), shall consist of the following five 32-bit words, in hex:
H 0(0) = 67452301
H 1(0) = efcdab89
H 2(0) = 98badcfe
H 3(0) = 10325476
H 4(0) = c3d2e1f0
5.3.2 SHA-224
For SHA-224, the initial hash value, H(0), shall consist of the following eight 32-bit words, in
hex:
H 0(0) = c1059ed8
H 1(0) = 367cd507
H 2(0) = 3070dd17
H 3(0) = f70e5939
H 4(0) = ffc00b31
H 5(0) = 68581511
H 6(0) = 64f98fa7
14
H 7(0) = befa4fa4
5.3.3 SHA-256
For SHA-256, the initial hash value, H(0), shall consist of the following eight 32-bit words, in
hex:
H 0(0) = 6a09e667
H 1(0) = bb67ae85
H 2(0) = 3c6ef372
H 3(0) = a54ff53a
H 4(0) = 510e527f
H 5(0) = 9b05688c
H 6(0) = 1f83d9ab
H 7(0) = 5be0cd19
These words were obtained by taking the first thirty-two bits of the fractional parts of the square
roots of the first eight prime numbers.
5.3.4 SHA-384
For SHA-384, the initial hash value, H(0), shall consist of the following eight 64-bit words, in
hex:
H 0(0) = cbbb9d5dc1059ed8
H 1(0) = 629a292a367cd507
H 2(0) = 9159015a3070dd17
H 3(0) = 152fecd8f70e5939
H 4(0) = 67332667ffc00b31
H 5(0) = 8eb44a8768581511
H 6(0) = db0c2e0d64f98fa7
H 7(0) = 47b5481dbefa4fa4
These words were obtained by taking the first sixty-four bits of the fractional parts of the square
roots of the ninth through sixteenth prime numbers.
5.3.5 SHA-512
For SHA-512, the initial hash value, H(0), shall consist of the following eight 64-bit words, in
hex:
H 0(0) = 6a09e667f3bcc908
H 1(0) = bb67ae8584caa73b
15
H 2(0) = 3c6ef372fe94f82b
H 3(0) = a54ff53a5f1d36f1
H 4(0) = 510e527fade682d1
H 5(0) = 9b05688c2b3e6c1f
H 6(0) = 1f83d9abfb41bd6b
H 7(0) = 5be0cd19137e2179
These words were obtained by taking the first sixty-four bits of the fractional parts of the square
roots of the first eight prime numbers.
5.3.6 SHA-512/t
“SHA-512/t” is the general name for a t-bit hash function based on SHA-512 whose output is
truncated to t bits. Each hash function requires a distinct initial hash value. This section provides
a procedure for determining the initial value for SHA-512/ t for a given value of t.
For SHA-512/t, t is any positive integer without a leading zero such that t < 512, and t is not 384.
For example: t is 256, but not 0256, and “SHA-512/t” is “SHA-512/256” (an 11 character long
ASCII string), which is equivalent to 53 48 41 2D 35 31 32 2F 32 35 36 in hexadecimal.
The initial hash value for SHA-512/t, for a given value of t, shall be generated by the SHA-512/t
IV Generation Function below.
Denote H(0)′ to be the initial hash value of SHA-512 as specified in Section 5.3.5 above.
For i = 0 to 7
{
Hi(0)′′ = Hi(0)′ ⊕
a5a5a5a5a5a5a5a5(in hex).
H(0) = SHA-512 (“SHA-512/t”) using H(0)′′ as the IV, where t is the specific truncation value.
(end.)
16
SHA-512/224 (t = 224) and SHA-512/256 (t = 256) are approved hash algorithms. Other SHA-
512/t hash algorithms with different t values may be specified in [SP 800-107] in the future as
the need arises. Below are the IVs for SHA-512/224 and SHA-512/256.
5.3.6.1 SHA-512/224
For SHA-512/224, the initial hash value, H(0), shall consist of the following eight 64-bit words,
in hex:
H 0(0) = 8C3D37C819544DA2
H 1(0) = 73E1996689DCD4D6
H 2(0) = 1DFAB7AE32FF9C82
H 3(0) = 679DD514582F9FCF
H 4(0) = 0F6D2B697BD44DA8
H 5(0) = 77E36F7304C48942
H 6(0) = 3F9D85A86A1D36C8
H 7(0) = 1112E6AD91D692A1
These words were obtained by executing the SHA-512/t IV Generation Function with t = 224.
5.3.6.2 SHA-512/256
For SHA-512/256, the initial hash value, H(0), shall consist of the following eight 64-bit words,
in hex:
H 0(0) = 22312194FC2BF72C
H 1(0) = 9F555FA3C84C64C2
H 2(0) = 2393B86B6F53B151
H 3(0) = 963877195940EABD
H 4(0) = 96283EE2A88EFFE3
H 5(0) = BE5E1E2553863992
H 6(0) = 2B0199FC2C85B8AA
H 7(0) = 0EB72DDC81C52CA2
These words were obtained by executing the SHA-512/t IV Generation Function with t = 256.
17
For each of the secure hash algorithms, there may exist alternate computation methods that yield
identical results; one example is the alternative SHA-1 computation described in Sec. 6.1.3.
Such alternate methods may be implemented in conformance to this standard.
6.1 SHA-1
SHA-1 may be used to hash a message, M, having a length of bits, where 0 ≤ < 2 64 . The
algorithm uses 1) a message schedule of eighty 32-bit words, 2) five working variables of 32 bits
each, and 3) a hash value of five 32-bit words. The final result of SHA-1 is a 160-bit message
digest.
The words of the message schedule are labeled W0, W1,…, W79. The five working variables are
labeled a, b, c, d, and e. The words of the hash value are labeled H 0( i) ,
H
1( i) ,
…
,
H
4( i) , which will
hold the initial hash value, H(0), replaced by each successive intermediate hash value (after each
message block is processed), H(i), and ending with the final hash value, H(N). SHA-1 also uses a
single temporary word, T.
Each message block, M(1), M(2), …, M(N), is processed in order, using the following steps:
18
For i=1 to N:
{
1. Prepare the message schedule, {Wt}:
M t (i) 0 ≤ t ≤ 15
Wt =
ROTL1( Wt−3 ⊕Wt−8 ⊕Wt−14 ⊕Wt−16 ) 16 ≤ t ≤ 79
2. Initialize the five working variables, a, b, c, d, and e, with the (i-1)st hash value:
a = H 0( i−1)
b = H 1( i−1)
c = H 2( i−1)
d = H 3( i−1)
e = H 4( i−1)
d = c
c = ROTL30 (b)
b = a
a = T
H
0( i ) = a + H 0( i −1)
H
1( i ) = b + H 1( i −1)
H
2( i ) = c + H 2( i −1)
H
3( i ) = d + H 3(i−1)
H
4( i ) = e + H 4( i −1)
}
19
After repeating steps one through four a total of N times (i.e., after processing M(N)), the resulting
160-bit message digest of the message, M, is
H
0( N ) H
1( N ) H
2( N ) H
3( N ) H
4( N )
However, if memory is limited, an alternative is to regard {Wt} as a circular queue that may be
implemented using an array of sixteen 32-bit words, W0, W1,…, W15. The alternate method that is
described in this section yields the same message digest as the SHA-1 computation method
described in Sec. 6.1.2. Although this alternate method saves sixty-four 32-bit words of storage,
it is likely to lengthen the execution time due to the increased complexity of the address
computations for the {Wt} in step (3).
For this alternate SHA-1 method, let MASK=0000000f (in hex). As in Sec. 6.1.1, addition is
performed modulo 232. Assuming that the preprocessing as described in Sec. 6.1.1 has been
performed, the processing of M(i) is as follows:
For i=1 to N:
{
1. For t=0 to 15:
Wt = M t(i)
}
2. Initialize the five working variables, a, b, c, d, and e, with the (i-1)st hash value:
a = H 0( i−1)
b = H 1( i−1)
c = H 2( i−1)
d = H 3( i−1)
e = H 4( i−1)
20
If t ≥ 16 then
{
Ws = ROTL1 (W( s +13)∧MASK ⊕ W( s +8)∧MASK ⊕ W( s +2)∧MASK ⊕ Ws )
}
H
0( i ) = a + H 0( i −1)
H
1( i ) = b + H 1( i −1)
H
2( i ) = c + H 2( i −1)
H
3( i ) = d + H 3(i−1)
H
4( i ) = e + H 4( i −1)
}
After repeating steps one through four a total of N times (i.e., after processing M(N)), the resulting
160-bit message digest of the message, M, is
H
0( N ) H
1( N ) H
2( N ) H
3( N ) H
4( N )
6.2 SHA-256
SHA-256 may be used to hash a message, M, having a length of bits, where 0 ≤ < 2 64 . The
algorithm uses 1) a message schedule of sixty-four 32-bit words, 2) eight working variables of 32
bits each, and 3) a hash value of eight 32-bit words. The final result of SHA-256 is a 256-bit
message digest.
The words of the message schedule are labeled W0, W1,…, W63. The eight working variables are
labeled a, b, c, d, e, f, g, and h. The words of the hash value are labeled H 0( i) ,
H
1( i) ,
…
,
H
7( i ) ,
which will hold the initial hash value, H(0), replaced by each successive intermediate hash value
21
(after each message block is processed), H(i), and ending with the final hash value, H(N). SHA-
256 also uses two temporary words, T1 and T2.
Each message block, M(1), M(2), …, M(N), is processed in order, using the following steps:
For i=1 to N:
M t(i) 0 ≤ t ≤ 15
Wt =
σ 1{256} (Wt −2 ) + Wt −7 + σ 0{256} (Wt −15 ) + Wt −16 16 ≤ t ≤ 63
2. Initialize the eight working variables, a, b, c, d, e, f, g, and h, with the (i-1)st hash
value:
a = H 0( i−1)
b = H 1( i−1)
c = H 2( i−1)
d = H 3( i−1)
e = H 4( i−1)
f = H 5( i−1)
g = H 6( i−1)
h = H 7( i−1)
22
H
0( i) = a + H 0( i−1)
H
1( i) = b + H 1( i−1)
H
2( i) = c + H 2( i−1)
H
3( i) = d + H 3( i−1)
H
4( i) = e + H 4( i−1)
H
5( i) = f + H 5( i−1)
H
6( i) = g + H 6( i−1)
H
7( i) = h + H 7( i−1)
}
After repeating steps one through four a total of N times (i.e., after processing M(N)), the resulting
256-bit message digest of the message, M, is
H
0( N ) H
1( N ) H
2( N ) H
3( N ) H
4( N ) H
5( N ) H
6( N ) H
7( N )
6.3 SHA-224
SHA-224 may be used to hash a message, M, having a length of bits, where 0 ≤ < 2 64 . The
function is defined in the exact same manner as SHA-256 (Section 6.2), with the following two
exceptions:
1. The initial hash value, H(0), shall be set as specified in Sec. 5.3.2; and
23
2. The 224-bit message digest is obtained by truncating the final hash value, H(N), to its
left-most 224 bits:
(N )
H
0( N ) H
1( N ) H
2( N ) H
3( N ) H
4( N ) H
5( N ) H
6
6.4 SHA-512
SHA-512 may be used to hash a message, M, having a length of bits, where 0 ≤ < 2128 . The
algorithm uses 1) a message schedule of eighty 64-bit words, 2) eight working variables of 64
bits each, and 3) a hash value of eight 64-bit words. The final result of SHA-512 is a 512-bit
message digest.
The words of the message schedule are labeled W0, W1,…, W79. The eight working variables are
labeled a, b, c, d, e, f, g, and h. The words of the hash value are labeled H 0( i) ,
H
1( i) ,
…
,
H
7( i) ,
which will hold the initial hash value, H(0), replaced by each successive intermediate hash value
(after each message block is processed), H(i), and ending with the final hash value, H(N). SHA-
512 also uses two temporary words, T1 and T2.
Each message block, M(1), M(2), …, M(N), is processed in order, using the following steps:
For i=1 to N:
{
1. Prepare the message schedule, {Wt}:
M t(i) 0 ≤ t ≤ 15
Wt =
σ 1{512} (Wt −2 ) + Wt −7 + σ 0{512} (Wt −15 ) + Wt −16 16 ≤ t ≤ 79
2. Initialize the eight working variables, a, b, c, d, e, f, g, and h, with the (i-1)st hash
value:
24
a = H 0( i−1)
b = H 1( i−1)
c = H 2( i−1)
d = H 3( i−1)
e = H 4( i−1)
f = H 5( i−1)
g = H 6( i−1)
h = H 7( i−1)
H
0( i) = a + H 0( i−1)
H
1( i) = b + H 1( i−1)
H
2( i) = c + H 2( i−1)
H
3( i) = d + H 3( i−1)
H
4( i) = e + H 4( i−1)
H
5( i) = f + H 5( i−1)
H
6( i) = g + H 6( i−1)
H
7( i) = h + H 7( i−1)
}
25
After repeating steps one through four a total of N times (i.e., after processing M(N)), the resulting
512-bit message digest of the message, M, is
H 0( N ) H1( N ) H 2( N ) H 3( N ) H 4( N ) H 5( N ) H 6( N ) H 7( N )
6.5 SHA-384
SHA-384 may be used to hash a message, M, having a length of bits, where 0 ≤ < 2128 . The
algorithm is defined in the exact same manner as SHA-512 (Sec. 6.4), with the following two
exceptions:
1. The initial hash value, H(0), shall be set as specified in Sec. 5.3.4; and
2. The 384-bit message digest is obtained by truncating the final hash value, H(N), to its
left-most 384 bits:
H
0( N ) H
1( N ) H
2( N ) H
3( N ) H
4( N ) H
5( N )
6.6 SHA-512/224
SHA-512/224 may be used to hash a message, M, having a length of bits, where 0 ≤ < 2128 .
The algorithm is defined in the exact same manner as SHA-512 (Sec. 6.4), with the following
two exceptions:
1. The initial hash value, H(0), shall be set as specified in Sec. 5.3.6.1; and
2. The 224-bit message digest is obtained by truncating the final hash value, H(N), to its
left-most 224 bits.
6.7 SHA-512/256
SHA-512/256 may be used to hash a message, M, having a length of bits, where 0 ≤ < 2128 .
The algorithm is defined in the exact same manner as SHA-512 (Sec. 6.4), with the following
two exceptions:
1. The initial hash value, H(0), shall be set as specified in Sec. 5.3.6.2; and
2. The 256-bit message digest is obtained by truncating the final hash value, H(N), to its
left-most 256 bits.
26
27
28
APPENDIX B: REFERENCES
[FIPS 180-3] NIST, Federal Information Processing Standards Publication 180-3, Secure
Hash Standards (SHS), October 2008.
[SP 800-57] NIST Special Publication (SP) 800-57, Part 1, Recommendation for Key
Management: General, (Draft) May 2011.
[SP 800-107] NIST Special Publication (SP) 800-107, Recommendation for Applications
Using Approved Hash Algorithms, (Revised), (Draft) September 2011.
29
2. FIPS 180-4 adds two additional algorithms: SHA-512/224 and SHA-512/256 to the
Standard and the method for determining the initial value for SHA-512/t for a given value
of t.
30