SlideShare una empresa de Scribd logo
1 de 20
SECURE
HASH
ALGORITHM
Secure Hash Algorithm ( SHA )
 Secure Hash Algorithm (SHA) was developed
by NIST along with NSA.
 In 1993, SHA was published as a Federal
Information Processing Standard.
 It has following versions-
 SHA-0
 SHA-1
 SHA-2
 SHA-3
SHA-1
 It works for any input message that is less than 264 bits.
 The output of SHA is a message digest of 160 bits in length.
 This is designed to be computationally infeasible to:
a) Obtain the original message , given its message digest.
b) Find two messages producing the same message digest.
How SHA-1 works?
 Step 1: Padding of Bits
 Step 2: Append Length
 Step 3: Divide the input into 512-bit blocks
1 0 1 1 0 1 0 0 0 0 0 0 0 0 …………………………… 0 0 0 0 1 1 0
Original
string
Padding of 0’s to 64 bits short of X 512
Length of
message
Total Message length multiple of 512
How SHA-1 works cont…
 Step 4: Initialize chaining variables
 Step 5: Process Blocks- Now the actual algorithm
begins….
Chaining Variables Hex values
A 01 23 45 67
B 89 AB CD EF
C FE DC BA 98
D 76 54 32 10
E C3 D2 E1 F0
How SHA-1 works cont…
 Step 5.1 : Copy chaining variables A-E into variables a-e.
 Step 5.2 : Divide current 512-bit block into 16 sub-blocks of
32-bits.
 Step 5.3 : SHA has 4 rounds, each consisting of 20 steps.
Each round takes 3 inputs-
• 512-bit block,
• The register abcde
• A constant K[t] (where t= 0 to 79)
Round Value of t between
1 1 and 19
2 20 and 39
3 40 and 59
4 60 and 79
How SHA-1 works cont…
 Step 5.4 : SHA has a total of 80 iterations (4 rounds X 20
-iterations). Each iteration consists of following
operations:-
abcde = ( e +Process P + S5(a) + W[t] + K[t] ), a, S30(b) , c , d
Where,
abcde = The register made up of 5 variables a, b, c, d, e.
Process P = The logic operation.
St = Circular-left shift of 32-bit sub-block by t bits.
W[t[ = A 32-bit derived from the current 32-bit sub-block.
K[t] = One of the five additive constants.
How SHA-1 works cont…
 Process P in each SHA round
Round Process P
1 (b AND c) OR (( NOT b) AND (d))
2 b XOR c XOR d
3 (b AND c ) OR (b AND d) OR (c AND d)
4 b XOR c XOR d
How SHA-1 works cont…
Single SHA-1 iteration
How SHA-1 works cont…
 The values of W[t] are calculated as follows :
 For the first 16 words of W (i.e. t=0 to 15) , the contents of the input
message sub-block M[t] become the contents of W[t].
 For the remaining 64 values of W are derived using the equation
W[t] = s1 ( W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3])
Comparison between MD5 and SHA-1
Point of discussion MD5 SHA-1
Message digest length in
bits
128 160
Attack to try and find the
original message given a
message digest
Requires 2128 operations to
break in.
Requires 2160 operations to
break in, therefore more
secure.
Attack to try and find two
messages producing same
message digest
Requires 264 operations to
break in.
Requires 280 operations to
break in.
Speed Faster Slower
Successful attempts so far There have been reported
attempts to some extent.
No such claims so far.
Parameters for various versions of SHA
Parameter SHA-1 SHA-256 SHA-384 SHA-512
Message digest size(in
bits)
160 256 384 512
Message size(in bits) <264 264 2128 2128
Block size (in bits) 512 512 1024 1024
Word size (in bits) 32 32 64 64
Steps in algorithm 80 64 80 80
SHA-512
 SHA-512 algorithm takes a message of length
2128 bits and produces a message digest of size
512 bits.
 SHA-512 was closely modeled after SHA-1 ,
which itself is modeled on MD5.
How SHA-512 works?
 Step 1 : Padding of bits – 128 bits short of a multiple of
1024.
 Step 2 : Append length.
 Step 3 : Divide the input into 1024-bit blocks.
 Step 4: Initialize chaining variables.
A= 6A09E667F3BCC908 B= BB67AE8584CAA73B
C= 3C6EF372FE94F82B D= A54FF53A5F1D36F1
E= 510E527FADE6821D F= 9B05688C2B3E6C1F
G= 1F83D9ABFB41BD6B H= 5BE0CD19137E2179
How SHA-512 works cont…
 Step 5 : Process blocks.
 Step 5.1 : Copy the variables A-H to a-h.
 Step 5.2 : Divide the 1024-bit block into 16 sub-blocks of
64-bit each.
 Step 5.3 : It takes 80 rounds with 1024-bit block, abcdefgh
register and K[t] constant as three inputs.
Each round consists of following operations:
Temp1 = h + Ch(e,f,g) + Sum (e[i] for i=1 to 512) + W[t] + K[t]
Temp2 = Sum (a[i] for i=0 to 512) + Maj(a,b,c)
a = Temp1 + Temp2
b = a
c = b
How SHA-512 works cont…
d = c
e = d + Temp1
f = e
g = f
h = g
Where,
t = round number
Ch (e,f,g) = (e AND f) XOR (NOT e AND g)
Maj (a,b,c) = (a AND b) XOR (a AND c) XOR (b AND c)
Sum (a[i]) = ROTR (a[i] by 28 bits) XOR ROTR (a[i] by 34 bits)
XOR ROTR (a[i] by 39 bits)
Sum (e[i]) = ROTR (e[i] by 14 bits) XOR ROTR (e[i] by
18 bits) XOR ROTR (e[i] by 41 bits)
How SHA-512 works cont…
ROTR(x) = Circular right shift, i.e. rotation , of the 64-bit
array x by the specified no. of bits.
W[t] = 64-bit word derived from the current 512-bit input
block.
K[t] = 64-bit additive constant.
+ (or Add) = Addition mod 264.
 In case of values of W[t] , for the first 16 rounds (0 to 15) ,
the value of W[t] is equal to the corresponding word in the
message block.
 For the remaining 64 steps, the value W[t] is equal to the
circular left shift by one bit of the XOR of the four preceding
values of W[t] with two of them subjected to shift and rotate
operations
How SHA-512 works cont…
Single SHA-512 iteration
Conclusion
 Developing Secure Hash Algorithm was initially major
concern for defense authorities.
 SHA produces message digest which has an application
in digital signature.
 In this way, this technique took a contributed in secure
and robust encryption.
Thank you for your attention!
Encrypt Safe…

Más contenido relacionado

La actualidad más candente

Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Register allocation and assignment
Register allocation and assignmentRegister allocation and assignment
Register allocation and assignmentKarthi Keyan
 
SHA 1 Algorithm.ppt
SHA 1 Algorithm.pptSHA 1 Algorithm.ppt
SHA 1 Algorithm.pptRajapriya82
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash functionChirag Patel
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash functionMijanur Rahman Milon
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its UsesMohsin Ali
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniquesvinitha96
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation harshit chavda
 
Message authentication
Message authenticationMessage authentication
Message authenticationCAS
 

La actualidad más candente (20)

Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Register allocation and assignment
Register allocation and assignmentRegister allocation and assignment
Register allocation and assignment
 
SHA 1 Algorithm.ppt
SHA 1 Algorithm.pptSHA 1 Algorithm.ppt
SHA 1 Algorithm.ppt
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Feistel cipher
Feistel cipherFeistel cipher
Feistel cipher
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
IP Security
IP SecurityIP Security
IP Security
 
AES Encryption
AES EncryptionAES Encryption
AES Encryption
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
SHA 1 Algorithm
SHA 1 AlgorithmSHA 1 Algorithm
SHA 1 Algorithm
 
Aes
AesAes
Aes
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Disk structure
Disk structureDisk structure
Disk structure
 
Message authentication
Message authenticationMessage authentication
Message authentication
 

Destacado

Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsdaxesh chauhan
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithmBob Landstrom
 
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Hash Functions, the MD5 Algorithm and the Future (SHA-3)Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Hash Functions, the MD5 Algorithm and the Future (SHA-3)Dylan Field
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmAjay Karri
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard) Sina Manavi
 

Destacado (8)

Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
 
MD5Algorithm
MD5AlgorithmMD5Algorithm
MD5Algorithm
 
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Hash Functions, the MD5 Algorithm and the Future (SHA-3)Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 

Similar a Secure Hash Algorithm

crypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.pptcrypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.pptshuchiagarwal12
 
Basic explanation to md5 implementation in C
Basic explanation to md5 implementation in CBasic explanation to md5 implementation in C
Basic explanation to md5 implementation in CSourav Punoriyar
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithmsYoung Alista
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithmsDavid Hoen
 
Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithmsHarry Potter
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithmsJames Wong
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithmsTony Nguyen
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithmsFraboni Ec
 
Data streaming algorithms
Data streaming algorithmsData streaming algorithms
Data streaming algorithmsHridyesh Bisht
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms Er Piyush Gupta IN ⊞⌘
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Block Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxBlock Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxUsamaAliLone3
 
Bitcoin Addresses
Bitcoin AddressesBitcoin Addresses
Bitcoin Addressesashmoran
 
AES effecitve software implementation
AES effecitve software implementationAES effecitve software implementation
AES effecitve software implementationRoman Oliynykov
 
CNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphy
CNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphy
CNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphymovocode
 

Similar a Secure Hash Algorithm (20)

SHA
SHASHA
SHA
 
crypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.pptcrypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.ppt
 
Sha
ShaSha
Sha
 
AES.pptx
AES.pptxAES.pptx
AES.pptx
 
Basic explanation to md5 implementation in C
Basic explanation to md5 implementation in CBasic explanation to md5 implementation in C
Basic explanation to md5 implementation in C
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithms
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Data streaming algorithms
Data streaming algorithmsData streaming algorithms
Data streaming algorithms
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Block Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxBlock Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docx
 
Bitcoin Addresses
Bitcoin AddressesBitcoin Addresses
Bitcoin Addresses
 
AES effecitve software implementation
AES effecitve software implementationAES effecitve software implementation
AES effecitve software implementation
 
CNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphy
CNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphy
CNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphyCNS__M4_MD5 Crypto graphy
 

Último

School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 

Último (20)

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 

Secure Hash Algorithm

  • 2. Secure Hash Algorithm ( SHA )  Secure Hash Algorithm (SHA) was developed by NIST along with NSA.  In 1993, SHA was published as a Federal Information Processing Standard.  It has following versions-  SHA-0  SHA-1  SHA-2  SHA-3
  • 3. SHA-1  It works for any input message that is less than 264 bits.  The output of SHA is a message digest of 160 bits in length.  This is designed to be computationally infeasible to: a) Obtain the original message , given its message digest. b) Find two messages producing the same message digest.
  • 4. How SHA-1 works?  Step 1: Padding of Bits  Step 2: Append Length  Step 3: Divide the input into 512-bit blocks 1 0 1 1 0 1 0 0 0 0 0 0 0 0 …………………………… 0 0 0 0 1 1 0 Original string Padding of 0’s to 64 bits short of X 512 Length of message Total Message length multiple of 512
  • 5. How SHA-1 works cont…  Step 4: Initialize chaining variables  Step 5: Process Blocks- Now the actual algorithm begins…. Chaining Variables Hex values A 01 23 45 67 B 89 AB CD EF C FE DC BA 98 D 76 54 32 10 E C3 D2 E1 F0
  • 6. How SHA-1 works cont…  Step 5.1 : Copy chaining variables A-E into variables a-e.  Step 5.2 : Divide current 512-bit block into 16 sub-blocks of 32-bits.  Step 5.3 : SHA has 4 rounds, each consisting of 20 steps. Each round takes 3 inputs- • 512-bit block, • The register abcde • A constant K[t] (where t= 0 to 79) Round Value of t between 1 1 and 19 2 20 and 39 3 40 and 59 4 60 and 79
  • 7. How SHA-1 works cont…  Step 5.4 : SHA has a total of 80 iterations (4 rounds X 20 -iterations). Each iteration consists of following operations:- abcde = ( e +Process P + S5(a) + W[t] + K[t] ), a, S30(b) , c , d Where, abcde = The register made up of 5 variables a, b, c, d, e. Process P = The logic operation. St = Circular-left shift of 32-bit sub-block by t bits. W[t[ = A 32-bit derived from the current 32-bit sub-block. K[t] = One of the five additive constants.
  • 8. How SHA-1 works cont…  Process P in each SHA round Round Process P 1 (b AND c) OR (( NOT b) AND (d)) 2 b XOR c XOR d 3 (b AND c ) OR (b AND d) OR (c AND d) 4 b XOR c XOR d
  • 9. How SHA-1 works cont… Single SHA-1 iteration
  • 10. How SHA-1 works cont…  The values of W[t] are calculated as follows :  For the first 16 words of W (i.e. t=0 to 15) , the contents of the input message sub-block M[t] become the contents of W[t].  For the remaining 64 values of W are derived using the equation W[t] = s1 ( W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3])
  • 11. Comparison between MD5 and SHA-1 Point of discussion MD5 SHA-1 Message digest length in bits 128 160 Attack to try and find the original message given a message digest Requires 2128 operations to break in. Requires 2160 operations to break in, therefore more secure. Attack to try and find two messages producing same message digest Requires 264 operations to break in. Requires 280 operations to break in. Speed Faster Slower Successful attempts so far There have been reported attempts to some extent. No such claims so far.
  • 12. Parameters for various versions of SHA Parameter SHA-1 SHA-256 SHA-384 SHA-512 Message digest size(in bits) 160 256 384 512 Message size(in bits) <264 264 2128 2128 Block size (in bits) 512 512 1024 1024 Word size (in bits) 32 32 64 64 Steps in algorithm 80 64 80 80
  • 13. SHA-512  SHA-512 algorithm takes a message of length 2128 bits and produces a message digest of size 512 bits.  SHA-512 was closely modeled after SHA-1 , which itself is modeled on MD5.
  • 14. How SHA-512 works?  Step 1 : Padding of bits – 128 bits short of a multiple of 1024.  Step 2 : Append length.  Step 3 : Divide the input into 1024-bit blocks.  Step 4: Initialize chaining variables. A= 6A09E667F3BCC908 B= BB67AE8584CAA73B C= 3C6EF372FE94F82B D= A54FF53A5F1D36F1 E= 510E527FADE6821D F= 9B05688C2B3E6C1F G= 1F83D9ABFB41BD6B H= 5BE0CD19137E2179
  • 15. How SHA-512 works cont…  Step 5 : Process blocks.  Step 5.1 : Copy the variables A-H to a-h.  Step 5.2 : Divide the 1024-bit block into 16 sub-blocks of 64-bit each.  Step 5.3 : It takes 80 rounds with 1024-bit block, abcdefgh register and K[t] constant as three inputs. Each round consists of following operations: Temp1 = h + Ch(e,f,g) + Sum (e[i] for i=1 to 512) + W[t] + K[t] Temp2 = Sum (a[i] for i=0 to 512) + Maj(a,b,c) a = Temp1 + Temp2 b = a c = b
  • 16. How SHA-512 works cont… d = c e = d + Temp1 f = e g = f h = g Where, t = round number Ch (e,f,g) = (e AND f) XOR (NOT e AND g) Maj (a,b,c) = (a AND b) XOR (a AND c) XOR (b AND c) Sum (a[i]) = ROTR (a[i] by 28 bits) XOR ROTR (a[i] by 34 bits) XOR ROTR (a[i] by 39 bits) Sum (e[i]) = ROTR (e[i] by 14 bits) XOR ROTR (e[i] by 18 bits) XOR ROTR (e[i] by 41 bits)
  • 17. How SHA-512 works cont… ROTR(x) = Circular right shift, i.e. rotation , of the 64-bit array x by the specified no. of bits. W[t] = 64-bit word derived from the current 512-bit input block. K[t] = 64-bit additive constant. + (or Add) = Addition mod 264.  In case of values of W[t] , for the first 16 rounds (0 to 15) , the value of W[t] is equal to the corresponding word in the message block.  For the remaining 64 steps, the value W[t] is equal to the circular left shift by one bit of the XOR of the four preceding values of W[t] with two of them subjected to shift and rotate operations
  • 18. How SHA-512 works cont… Single SHA-512 iteration
  • 19. Conclusion  Developing Secure Hash Algorithm was initially major concern for defense authorities.  SHA produces message digest which has an application in digital signature.  In this way, this technique took a contributed in secure and robust encryption.
  • 20. Thank you for your attention! Encrypt Safe…