You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@httpd.apache.org by "Roy T. Fielding" <fi...@gbiv.com> on 2006/01/05 08:28:01 UTC

Fwd: I-D ACTION:draft-eastlake-sha2-01.txt

It might be a good project for someone to take this I-D and convert
it to an apache utility library.

....Roy

Begin forwarded message:

> From: Internet-Drafts@ietf.org
> Date: January 4, 2006 12:50:01 PM PST
> To: i-d-announce@ietf.org
> Subject: I-D ACTION:draft-eastlake-sha2-01.txt
> Reply-To: internet-drafts@ietf.org
> Message-Id: <E1...@newodin.ietf.org>
>
> A New Internet-Draft is available from the on-line Internet-Drafts  
> directories.
>
>
> 	Title		: US Secure Hash Algorithms (SHA)
> 	Author(s)	: D. Eastlake 3rd, T. Hansen
> 	Filename	: draft-eastlake-sha2-01.txt
> 	Pages		: 99
> 	Date		: 2006-1-4
> 	
> The United States of America has adopted a suite of secure hash
>    algorithms (SHAs), including four beyond SHA-1, as part of a  
> Federal
>    Information Processing Standard (FIPS), specifically SHA-224 [RFC
>    3874], SHA-256, SHA-384, and SHA-512.  The purpose of this document
>    is to make open source code performing these hash functions
>    conveniently available to the Internet community. The sample code
>    supports input strings of arbitrary bit length. SHA-1's sample code
>    from [RFC 3174] has also been updated to handle an input string of
>    arbitrary length. Most of the text herein was adapted by the  
> authors
>    from FIPS 180-2.
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-eastlake-sha2-01.txt