Hi Doctor,

Form the docs:
    SHA1 is the digest of choice for new applications.

It appears the docs are bit dated. Depending on the application, I
believe NIST recommends that new applications use SHA-2 family (circa
2006 [1]), and requires SHA-2 after 2010 [2]. Considering McDonald,
Hawkes, and Pieprzyk the security level of SHA-1 to 2^52 (Europcrypt
2009), SHA-2 should probably be recommended.

Jeff

[1] http://csrc.nist.gov/groups/ST/toolkit/secure_hashing.html
[2] http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf
[3] http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d.pdf

On Tue, Oct 6, 2009 at 4:36 PM, Dr. Stephen Henson <st...@openssl.org> wrote:
> On Tue, Oct 06, 2009, Reid Thompson wrote:
>
>> On Tue, 2009-10-06 at 10:44 -0500, Dwight Schauer wrote:
>> > http://stackoverflow.com/questions/918676/generate-sha-hash-in-openssl
>> >
>> > Replace SHA1 with SHA256.
>> > Replace 20 with SHA256_DIGEST_LENGTH.
>> >
>> > Could someone point me to an example C program, docs that show how to
>> > generate a sha-256 digest for a buffer?
>>
>> [SNIP]
>
> Both of these use the low level APIs which are deprecated.
>
> The approved technique is using EVP.
>
> http://www.openssl.org/docs/crypto/EVP_DigestInit.html#EXAMPLE
>
> Steve.
> --
> Dr Stephen N. Henson. OpenSSL project core developer.
> Commercial tech support now available see: http://www.openssl.org
>
> [SNIP]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to