• X9 X9.30-2-1997
Provide PDF Format

Learn More

X9 X9.30-2-1997

  • Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1)
  • standard by Accredited Standards Committee X9 Incorporated, 01/06/1997
  • Publisher: X9

$30.00$60.00


Produces a 160-bit representation of the message, called the message digest, when a message with a bit length less than 2 to 64th power is input. The message digest is used during the generation of a signature for the message. The message digest is computed during the generation of a signature for the message. The SHA-1 is also used to compute a message digest for the received version of the message during the process of verifying the signature. Any change to the message in transit will, with a very high probability, result in a different messages digest, and the signature will fail to verify. The Secure Hash Algorithm (SHA-1) described in this standard is required for use with the Digital Signature Algorithm and may be used whenever a secure hash algorithm is required.

Related Products

X9 TG-24-1999

X9 TG-24-1999

Technical Guideline: Managing Risk and Migration Planning: Withdrawal of ANSI X9.9, Financial Inst..

$47.00 $94.00

X9 X9.100-180-2006 (R2009)

X9 X9.100-180-2006 (R2009)

Specifications for Electronic Exchange of Check and Image Data (non-domestic) (Formerly DSTU X9.100-..

$50.00 $100.00

X9 TR 2-2005

X9 TR 2-2005

Understanding, Designing and Producing Checks..

$50.00 $100.00

X9 X9.99-2004

X9 X9.99-2004

Privacy Impact Assessment Standard..

$30.00 $60.00