Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Transitioning Away from SHA-1 for All Applications

NIST is introducing a plan to transition away from the current limited use of the Secure Hash Algorithm 1 (SHA-1) hash function. Other approved hash functions are already available. The transition will be completed by December 31, 2030.

NIST is introducing a plan to transition away from the current limited use of the Secure Hash Algorithm 1 (SHA-1) hash function. Other approved hash functions are already available. The transition will be completed by December 31, 2030, and NIST will engage with stakeholders throughout the transition process.

Background

SHA-1 was first specified in 1995 in Federal Information Processing Standard (FIPS) 180-1, Secure Hash Standard (SHS). In 2005, a serious cryptanalytic attack was announced about SHA-1’s collision resistance – a necessary property for its use in digital signature applications. NIST responded in 2006 with an announcement encouraging a rapid transition to the use of the SHA-2 family of hash functions for digital signature applications, which were initially specified in FIPS 180-2. NIST began a competitive process to develop an additional hash function, which resulted in the SHA-3 family of hash functions published in 2015 as FIPS 202. In 2011, NIST released SP 800-131A, which announced the deprecation of SHA-1 when generating new digital signatures and restricted further use of SHA-1 to only where allowed in NIST protocol-specific guidance.

Objective

Cryptanalytic attacks on the SHA-1 hash function as used in other applications have become increasingly severe in recent years ("SHA-1 is a Shambles" by Leurent and Peyrin, 2020). As a result, NIST will transition away from the use of SHA-1 for applying cryptographic protection to all applications by December 31, 2030. Note that after this termination date, it may be necessary to use SHA-1 for handling information protected prior to the termination date; the SHA-1 specification will remain available for this purpose.

Plan

Before December 31, 2030, NIST plans to:

  • Publish FIPS 180-5 (a revision of FIPS 180) to remove the SHA-1 specification,
  • Revise SP 800-131A and other affected NIST publications to reflect the planned withdrawal of SHA-1, and
  • Create and publish a transition strategy for the Cryptographic Module Validation Program (CMVP) and the Cryptographic Algorithm Validation Program (CAVP).

Throughout this process, NIST will actively engage with government agencies, validation testing laboratories, vendors, Standards Developing Organizations, sector/industry organizations, users, and other stakeholders to minimize potential impacts and facilitate a smooth transition.

NIST encourages these entities to begin planning for this transition now. By completing their transition before December 31, 2030, stakeholders – particularly cryptographic module vendors – can help minimize potential delays in the validation process.

Contact

Send questions about the transition in an email to sha-1-transition [at] nist.gov (sha-1-transition[at]nist[dot]gov). Visit the Policy on Hash Functions page to learn more.

Released December 15, 2022, Updated December 20, 2022