SHA-384Secure Hashing Algorithm, 384-Bits
Copyright 1988-2018, All rights reserved.
References in periodicals archive ?
Hash Message Chaining Hash Step Word function block value value function size MD4 512 bits 128 bits 128 bits 48 steps 32 bits MD5 512 bits 128 bits 128 bits 64 steps 32 bits SHA-224 512 bits 256 bits 224 bits 64 steps 32 bits SHA-256 512 bits 256 bits 256 bits 64 steps 32 bits SHA-384 1024 bits 512 bits 384 bits 80 steps 64 bits SHA-512 1024 bits 512 bits 512 bits 80 steps 64 bits TABLE 3: Recovery of ([K.sub.1,0], [K.sub.1,1], [K.sub.1,2]).
Secure Pocket Drive uses the same on-board hardware security infrastructure that is built into the SPYRUS Hydra Privacy CardR family, including AES CBC, ECDH, ECDSA, ECC P-384, and SHA-384, which together make up the National Security Agency's Suite B cryptography, a part of its cryptographic modernization program.
In the near future, the Reversible Digital Signature Algorithm (rDSA), the Elliptic Curve Digital Signature Algorithm (ECDSA), SHA-256, SHA-384, and SHA-512, and HMAC validation suites also will be available.