| DESCRIPTION OF ENHANCEMENTS |
Subject: SECURE HASH LIBRARY FUNCTIONS
180-4) specifies secure hash algorithms for computing a condensed
representation of electronic data (message). The hash algorithms
specified in this Standard are called secure because, for a given
algorithm, it is computationally infeasible 1) to find a message that
corresponds to a given message digest, or 2) to find two different
messages that produce the same message digest. Any change to a message
will, with a very high probability, result in a different message digest.
SHA-256 algorithm taken from the NIST document:
http://csrc.nist.gov/groups/STM/cavp/documents/shs/sha256-384-512.pdf
This routine provides new Kernel APIS for Secure Hash Algorithm (SHA-256)
hashing of input of various formats:
$$FILE^XLFSH256(FILENUM,IEN,FIELD) - Return the SHA-256 hash for the
specified file entry
$$HOSTFILE^XLFSH256(PATH,FILENAME) - Return the SHA-256 hash for a
host file
$$ROUTINE^XLFSH256(ROUTINE) - Return the SHA-256 hash for a
routine
$$SHA256^XLFSH256(MESSAGE) - SHA-256 hash for a message that
Category: ROUTINE
can
be passed as a single string
$$LSHA256^XLFSH256(MSUB,NBLOCKS) - SHA-256 hash for a message too
long
to be passed as a single string
In addition, this routine provides several new Math Library Functions
that were used to create the SHA-256 hash:
$$AND^XLFSH256(X,Y) - logical bitwise AND 32 bits
$$NOT^XLFSH256(X) - logical bitwise NOT 32 bits
ENHANCEMENT
$$XOR^XLFSH256(X,Y) - logical bitwise XOR 32 bits
$$N32H^XLFSH256(X) - Convert 32 bit decimal to
hexidecimal
$$RD4BYTES^XLFSH256(MESSAGE,OFFSET) - Return the big-endian 32 bits
value
$$N64BIG^XLFSH256(NUM) - Return a 64-bit big-endian integer
$$RROTATE^XLFSH256(X,N) - Right rotate 32 bits
$$RSHIFT^XLFSH256(X,N) - Right shift 32 bits
Description:
===========
Federal Information Processing Standards Publication 180-4 (FIPS PUB
|