Matches in DBpedia 2016-04 for { <http://wikidata.dbpedia.org/resource/Q1968605> ?p ?o }
Showing triples 1 to 91 of
91
with 100 triples per page.
- Q1968605 subject Q6109049.
- Q1968605 subject Q6427939.
- Q1968605 subject Q8269001.
- Q1968605 abstract "SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the NSA. SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with. A key aspect of cryptographic hash functions is their collision resistance: nobody should be able to find two different input values that result in the same hash output.SHA-2 includes significant changes from its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds. SHA-224 and SHA-384 are simply truncated versions of the first two, computed with different initial values. SHA-512/224 and SHA-512/256 are also truncated versions of SHA-512, but the initial values are generated using the method described in FIPS PUB 180-4. SHA-2 was published in 2001 by the NIST as a U.S. federal standard (FIPS). The SHA-2 family of algorithms are patented in US patent 6829355. The United States has released the patent under a royalty-free license.In 2005, an algorithm emerged for finding SHA-1 collisions in about 2,000-times fewer steps than was previously thought possible. Although (as of 2015) no example of a SHA-1 collision has been published yet, the security margin left by SHA-1 is weaker than intended, and its use is therefore no longer recommended for applications that depend on collision resistance, such as digital signatures. Although SHA-2 bears some similarity to the SHA-1 algorithm, these attacks have not been successfully extended to SHA-2.Currently, the best public attacks break preimage resistance for 52 rounds of SHA-256 or 57 rounds of SHA-512, and collision resistance for 46 rounds of SHA-256, as shown in the Cryptanalysis and validation section below.".
- Q1968605 thumbnail SHA-2.svg?width=300.
- Q1968605 wikiPageExternalLink secure_hashing.html.
- Q1968605 wikiPageExternalLink shaval.htm.
- Q1968605 wikiPageExternalLink fips-180-4.pdf.
- Q1968605 wikiPageExternalLink 03.
- Q1968605 wikiPageExternalLink index.html.
- Q1968605 wikiPageExternalLink shachecker.com.
- Q1968605 wikiPageExternalLink ?f=fips_sha_shs.info.txt.
- Q1968605 wikiPageExternalLink ?f=fips_sha_shs.standard.txt.
- Q1968605 wikiPageExternalLink sha256-384-512.pdf.
- Q1968605 wikiPageExternalLink index.html.
- Q1968605 wikiPageWikiLink Q1024309.
- Q1968605 wikiPageWikiLink Q1187426.
- Q1968605 wikiPageWikiLink Q1190947.
- Q1968605 wikiPageWikiLink Q1195184.
- Q1968605 wikiPageWikiLink Q1208241.
- Q1968605 wikiPageWikiLink Q121194.
- Q1968605 wikiPageWikiLink Q1224471.
- Q1968605 wikiPageWikiLink Q1227452.
- Q1968605 wikiPageWikiLink Q131723.
- Q1968605 wikiPageWikiLink Q13414952.
- Q1968605 wikiPageWikiLink Q13479982.
- Q1968605 wikiPageWikiLink Q134983.
- Q1968605 wikiPageWikiLink Q1505049.
- Q1968605 wikiPageWikiLink Q15229223.
- Q1968605 wikiPageWikiLink Q1663719.
- Q1968605 wikiPageWikiLink Q1669397.
- Q1968605 wikiPageWikiLink Q16937479.
- Q1968605 wikiPageWikiLink Q170460.
- Q1968605 wikiPageWikiLink Q17083510.
- Q1968605 wikiPageWikiLink Q1757463.
- Q1968605 wikiPageWikiLink Q176691.
- Q1968605 wikiPageWikiLink Q1779448.
- Q1968605 wikiPageWikiLink Q182933.
- Q1968605 wikiPageWikiLink Q185235.
- Q1968605 wikiPageWikiLink Q189224.
- Q1968605 wikiPageWikiLink Q1943260.
- Q1968605 wikiPageWikiLink Q1990841.
- Q1968605 wikiPageWikiLink Q206494.
- Q1968605 wikiPageWikiLink Q210214.
- Q1968605 wikiPageWikiLink Q217302.
- Q1968605 wikiPageWikiLink Q220849.
- Q1968605 wikiPageWikiLink Q2605645.
- Q1968605 wikiPageWikiLink Q272629.
- Q1968605 wikiPageWikiLink Q30.
- Q1968605 wikiPageWikiLink Q3075219.
- Q1968605 wikiPageWikiLink Q3132224.
- Q1968605 wikiPageWikiLink Q319400.
- Q1968605 wikiPageWikiLink Q3478074.
- Q1968605 wikiPageWikiLink Q357569.
- Q1968605 wikiPageWikiLink Q387688.
- Q1968605 wikiPageWikiLink Q389463.
- Q1968605 wikiPageWikiLink Q399981.
- Q1968605 wikiPageWikiLink Q41187.
- Q1968605 wikiPageWikiLink Q41609.
- Q1968605 wikiPageWikiLink Q42332.
- Q1968605 wikiPageWikiLink Q462005.
- Q1968605 wikiPageWikiLink Q477202.
- Q1968605 wikiPageWikiLink Q478358.
- Q1968605 wikiPageWikiLink Q48525.
- Q1968605 wikiPageWikiLink Q498186.
- Q1968605 wikiPageWikiLink Q5155845.
- Q1968605 wikiPageWikiLink Q5190933.
- Q1968605 wikiPageWikiLink Q5436988.
- Q1968605 wikiPageWikiLink Q597935.
- Q1968605 wikiPageWikiLink Q6109049.
- Q1968605 wikiPageWikiLink Q615485.
- Q1968605 wikiPageWikiLink Q6427939.
- Q1968605 wikiPageWikiLink Q70475.
- Q1968605 wikiPageWikiLink Q7249984.
- Q1968605 wikiPageWikiLink Q7439366.
- Q1968605 wikiPageWikiLink Q7444848.
- Q1968605 wikiPageWikiLink Q7593.
- Q1968605 wikiPageWikiLink Q777.
- Q1968605 wikiPageWikiLink Q8269001.
- Q1968605 wikiPageWikiLink Q838075.
- Q1968605 wikiPageWikiLink Q8679274.
- Q1968605 wikiPageWikiLink Q869370.
- Q1968605 wikiPageWikiLink Q879126.
- Q1968605 wikiPageWikiLink Q8805.
- Q1968605 wikiPageWikiLink Q917824.
- Q1968605 wikiPageWikiLink Q938066.
- Q1968605 wikiPageWikiLink Q955764.
- Q1968605 comment "SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the NSA. SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity.".
- Q1968605 label "SHA-2".
- Q1968605 depiction SHA-2.svg.
- Q1968605 homepage secure_hashing.html.