Secure Hash Algorithmï¼ã»ãã¥ã¢ããã·ã¥ã¢ã«ã´ãªãºã ï¼ãç¥ç§°SHAã¯ãä¸ç¾¤ã®é¢é£ããæå·å¦çããã·ã¥é¢æ°ã§ãããã¢ã¡ãªã«å½ç«æ¨æºæè¡ç 究æï¼NISTï¼ã«ãã£ã¦æ¨æºã®ããã·ã¥é¢æ°Secure Hash Standardã«æå®ããã¦ããã ï¼2017å¹´ç¾å¨ï¼SHA-0ãSHA-1ãSHA-2ãSHA-3ã®4種é¡ï¼ãªãããSHA-0ã¯SHA-1ã«å«ãã¦3種é¡ï¼ã«å¤§å¥ããããSHA-2ã¾ã§ã¯MD5ãªã©ã¨åã MerkleâDamgÃ¥rd constructionï¼en:MerkleâDamgÃ¥rd constructionï¼ã®ããªã¨ã¼ã·ã§ã³ã¨è¨ããæ§é ã ããSHA-3 ã¯å ¨ãå¥ã®æ§é ã¨ãªã£ã¦ãããSHA-2 以éã¯ããã·ã¥ãµã¤ãºã大ããããããªã¨ã¼ã·ã§ã³ãç¨æããã¦ãããSHA-2ã«ã¯ãSHA-224ãSHA-256ãSHA-384ãSHA-512ãSHA-512/224ãSH
{{#tags}}- {{label}}
{{/tags}}