Logo
Login Sign Up
Current Revision

ASC X9 ANSI X9.30-2:1997

Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1)
Best Price Guarantee
Instant

$60.00

2-5 Days

$60.00

SAVE 10%

$108.00


Sub Total (1 Item(s))

$ 0.00

Estimated Shipping

$ 0.00

Total (Pre-Tax)

$ 0.00


or
Accredited Standards Committee X9, Inc. Logo

ASC X9 ANSI X9.30-2:1997

Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1)

PUBLISH DATE 1997
ASC X9 ANSI X9.30-2:1997
Produces a 160-bit representation of the message, called the message digest, when a message with a bit length less than 2 to 64th power is input. The message digest is used during the generation of a signature for the message. The message digest is computed during the generation of a signature for the message. The SHA-1 is also used to compute a message digest for the received version of the message during the process of verifying the signature. Any change to the message in transit will, with a very high probability, result in a different messages digest, and the signature will fail to verify. The Secure Hash Algorithm (SHA-1) described in this standard is required for use with the Digital Signature Algorithm and may be used whenever a secure hash algorithm is required.
SDO ASC X9: Accredited Standards Committee X9, Inc.
Document Number X9.30-2
Publication Date Jan. 1, 1997
Language en - English
Page Count
Revision Level
Supercedes
Committee
Publish Date Document Id Type View
Jan. 1, 1997 Revision