Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS) 180-4 | NIST
暂无分享,去创建一个
Cryptographic methods provide strong ways to protect information technology (IT) systems, applications, and information. Organizations using cryptographic methods can maintain the confidentiality and integrity of information, verify that information was not changed after it was sent, and authenticate the originator of the information. Modern cryptography uses mathematical techniques and relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key, which determines the specifics of algorithm operation.