SlideShare a Scribd company logo
2
Most read
5
Most read
9
Most read
SECURE
HASH
ALGORITHM
Secure Hash Algorithm ( SHA )
 Secure Hash Algorithm (SHA) was developed
by NIST along with NSA.
 In 1993, SHA was published as a Federal
Information Processing Standard.
 It has following versions-
 SHA-0
 SHA-1
 SHA-2
 SHA-3
SHA-1
 It works for any input message that is less than 264 bits.
 The output of SHA is a message digest of 160 bits in length.
 This is designed to be computationally infeasible to:
a) Obtain the original message , given its message digest.
b) Find two messages producing the same message digest.
How SHA-1 works?
 Step 1: Padding of Bits
 Step 2: Append Length
 Step 3: Divide the input into 512-bit blocks
1 0 1 1 0 1 0 0 0 0 0 0 0 0 …………………………… 0 0 0 0 1 1 0
Original
string
Padding of 0’s to 64 bits short of X 512
Length of
message
Total Message length multiple of 512
How SHA-1 works cont…
 Step 4: Initialize chaining variables
 Step 5: Process Blocks- Now the actual algorithm
begins….
Chaining Variables Hex values
A 01 23 45 67
B 89 AB CD EF
C FE DC BA 98
D 76 54 32 10
E C3 D2 E1 F0
How SHA-1 works cont…
 Step 5.1 : Copy chaining variables A-E into variables a-e.
 Step 5.2 : Divide current 512-bit block into 16 sub-blocks of
32-bits.
 Step 5.3 : SHA has 4 rounds, each consisting of 20 steps.
Each round takes 3 inputs-
• 512-bit block,
• The register abcde
• A constant K[t] (where t= 0 to 79)
Round Value of t between
1 1 and 19
2 20 and 39
3 40 and 59
4 60 and 79
How SHA-1 works cont…
 Step 5.4 : SHA has a total of 80 iterations (4 rounds X 20
-iterations). Each iteration consists of following
operations:-
abcde = ( e +Process P + S5(a) + W[t] + K[t] ), a, S30(b) , c , d
Where,
abcde = The register made up of 5 variables a, b, c, d, e.
Process P = The logic operation.
St = Circular-left shift of 32-bit sub-block by t bits.
W[t[ = A 32-bit derived from the current 32-bit sub-block.
K[t] = One of the five additive constants.
How SHA-1 works cont…
 Process P in each SHA round
Round Process P
1 (b AND c) OR (( NOT b) AND (d))
2 b XOR c XOR d
3 (b AND c ) OR (b AND d) OR (c AND d)
4 b XOR c XOR d
How SHA-1 works cont…
Single SHA-1 iteration
How SHA-1 works cont…
 The values of W[t] are calculated as follows :
 For the first 16 words of W (i.e. t=0 to 15) , the contents of the input
message sub-block M[t] become the contents of W[t].
 For the remaining 64 values of W are derived using the equation
W[t] = s1 ( W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3])
Comparison between MD5 and SHA-1
Point of discussion MD5 SHA-1
Message digest length in
bits
128 160
Attack to try and find the
original message given a
message digest
Requires 2128 operations to
break in.
Requires 2160 operations to
break in, therefore more
secure.
Attack to try and find two
messages producing same
message digest
Requires 264 operations to
break in.
Requires 280 operations to
break in.
Speed Faster Slower
Successful attempts so far There have been reported
attempts to some extent.
No such claims so far.
Parameters for various versions of SHA
Parameter SHA-1 SHA-256 SHA-384 SHA-512
Message digest size(in
bits)
160 256 384 512
Message size(in bits) <264 264 2128 2128
Block size (in bits) 512 512 1024 1024
Word size (in bits) 32 32 64 64
Steps in algorithm 80 64 80 80
SHA-512
 SHA-512 algorithm takes a message of length
2128 bits and produces a message digest of size
512 bits.
 SHA-512 was closely modeled after SHA-1 ,
which itself is modeled on MD5.
How SHA-512 works?
 Step 1 : Padding of bits – 128 bits short of a multiple of
1024.
 Step 2 : Append length.
 Step 3 : Divide the input into 1024-bit blocks.
 Step 4: Initialize chaining variables.
A= 6A09E667F3BCC908 B= BB67AE8584CAA73B
C= 3C6EF372FE94F82B D= A54FF53A5F1D36F1
E= 510E527FADE6821D F= 9B05688C2B3E6C1F
G= 1F83D9ABFB41BD6B H= 5BE0CD19137E2179
How SHA-512 works cont…
 Step 5 : Process blocks.
 Step 5.1 : Copy the variables A-H to a-h.
 Step 5.2 : Divide the 1024-bit block into 16 sub-blocks of
64-bit each.
 Step 5.3 : It takes 80 rounds with 1024-bit block, abcdefgh
register and K[t] constant as three inputs.
Each round consists of following operations:
Temp1 = h + Ch(e,f,g) + Sum (e[i] for i=1 to 512) + W[t] + K[t]
Temp2 = Sum (a[i] for i=0 to 512) + Maj(a,b,c)
a = Temp1 + Temp2
b = a
c = b
How SHA-512 works cont…
d = c
e = d + Temp1
f = e
g = f
h = g
Where,
t = round number
Ch (e,f,g) = (e AND f) XOR (NOT e AND g)
Maj (a,b,c) = (a AND b) XOR (a AND c) XOR (b AND c)
Sum (a[i]) = ROTR (a[i] by 28 bits) XOR ROTR (a[i] by 34 bits)
XOR ROTR (a[i] by 39 bits)
Sum (e[i]) = ROTR (e[i] by 14 bits) XOR ROTR (e[i] by
18 bits) XOR ROTR (e[i] by 41 bits)
How SHA-512 works cont…
ROTR(x) = Circular right shift, i.e. rotation , of the 64-bit
array x by the specified no. of bits.
W[t] = 64-bit word derived from the current 512-bit input
block.
K[t] = 64-bit additive constant.
+ (or Add) = Addition mod 264.
 In case of values of W[t] , for the first 16 rounds (0 to 15) ,
the value of W[t] is equal to the corresponding word in the
message block.
 For the remaining 64 steps, the value W[t] is equal to the
circular left shift by one bit of the XOR of the four preceding
values of W[t] with two of them subjected to shift and rotate
operations
How SHA-512 works cont…
Single SHA-512 iteration
Conclusion
 Developing Secure Hash Algorithm was initially major
concern for defense authorities.
 SHA produces message digest which has an application
in digital signature.
 In this way, this technique took a contributed in secure
and robust encryption.
Thank you for your attention!
Encrypt Safe…

More Related Content

PPTX
SHA- Secure hashing algorithm
PPTX
Secure Hash Algorithm (SHA-512)
PDF
SHA 1 Algorithm
PPT
SHA 1 Algorithm.ppt
PPTX
Hash Function
PDF
Sha
PPTX
unit 4.pptx of hash function in cryptography
PPTX
Message digest 5
SHA- Secure hashing algorithm
Secure Hash Algorithm (SHA-512)
SHA 1 Algorithm
SHA 1 Algorithm.ppt
Hash Function
Sha
unit 4.pptx of hash function in cryptography
Message digest 5

What's hot (20)

PPT
block ciphers
PPTX
Cryptography.ppt
PPTX
5. message authentication and hash function
PPTX
Public Key Cryptosystem
PPTX
Cryptography and network security
PPTX
Block cipher modes of operation
PPT
DES (Data Encryption Standard) pressentation
PPTX
Data Encryption Standard (DES)
PPTX
MAC-Message Authentication Codes
PPT
Secure Socket Layer
PPTX
Hash function
PPTX
Cryptography and Network Security
PPTX
OSI Security Architecture
DOCX
What is AES? Advanced Encryption Standards
PDF
Mini Project on Data Encryption & Decryption in JAVA
PPTX
Key management and distribution
PPT
Block Cipher and its Design Principles
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PDF
Parallel Algorithms
block ciphers
Cryptography.ppt
5. message authentication and hash function
Public Key Cryptosystem
Cryptography and network security
Block cipher modes of operation
DES (Data Encryption Standard) pressentation
Data Encryption Standard (DES)
MAC-Message Authentication Codes
Secure Socket Layer
Hash function
Cryptography and Network Security
OSI Security Architecture
What is AES? Advanced Encryption Standards
Mini Project on Data Encryption & Decryption in JAVA
Key management and distribution
Block Cipher and its Design Principles
Cryptography and Network Security William Stallings Lawrie Brown
Parallel Algorithms
Ad

Viewers also liked (9)

PPT
Secure hashing algorithm
PPT
Rsa and diffie hellman algorithms
PPTX
RSA & MD5 algorithm
PDF
The MD5 hashing algorithm
PPT
MD5Algorithm
PDF
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
PPTX
Message Authentication using Message Digests and the MD5 Algorithm
PPTX
Aes (advance encryption standard)
PDF
AES-Advanced Encryption Standard
Secure hashing algorithm
Rsa and diffie hellman algorithms
RSA & MD5 algorithm
The MD5 hashing algorithm
MD5Algorithm
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Message Authentication using Message Digests and the MD5 Algorithm
Aes (advance encryption standard)
AES-Advanced Encryption Standard
Ad

Similar to Secure Hash Algorithm (20)

PPT
crypto secure-hash-algorithm-versions.ppt
PDF
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
PPTX
Information and network security 39 secure hash algorithm
PPTX
Secure Hash Authentication in Network Security.pptx
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash& mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PDF
A Comparative Analysis between SHA and MD5 algorithms
PPTX
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
PDF
Count based Secured Hash Algorithm.
PPT
Hash Function & Analysis
PDF
The SHA Hashing Algorithm
PPTX
Secure Hashing Techniques - Introduction
PPTX
Secure Hash Algorithm (SHA 256) - Detailed Architecture
PDF
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
crypto secure-hash-algorithm-versions.ppt
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
Information and network security 39 secure hash algorithm
Secure Hash Authentication in Network Security.pptx
Hash mac algorithms
Hash mac algorithms
Hash mac algorithms
Hash mac algorithms
Hash& mac algorithms
Hash mac algorithms
Hash mac algorithms
A Comparative Analysis between SHA and MD5 algorithms
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
Count based Secured Hash Algorithm.
Hash Function & Analysis
The SHA Hashing Algorithm
Secure Hashing Techniques - Introduction
Secure Hash Algorithm (SHA 256) - Detailed Architecture
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique

Recently uploaded (20)

PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
composite construction of structures.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPT
Project quality management in manufacturing
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Well-logging-methods_new................
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Welding lecture in detail for understanding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Construction Project Organization Group 2.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Geodesy 1.pptx...............................................
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
composite construction of structures.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
R24 SURVEYING LAB MANUAL for civil enggi
Project quality management in manufacturing
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Foundation to blockchain - A guide to Blockchain Tech
Well-logging-methods_new................
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
573137875-Attendance-Management-System-original
bas. eng. economics group 4 presentation 1.pptx
Welding lecture in detail for understanding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Lecture Notes Electrical Wiring System Components
Construction Project Organization Group 2.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Geodesy 1.pptx...............................................

Secure Hash Algorithm

  • 2. Secure Hash Algorithm ( SHA )  Secure Hash Algorithm (SHA) was developed by NIST along with NSA.  In 1993, SHA was published as a Federal Information Processing Standard.  It has following versions-  SHA-0  SHA-1  SHA-2  SHA-3
  • 3. SHA-1  It works for any input message that is less than 264 bits.  The output of SHA is a message digest of 160 bits in length.  This is designed to be computationally infeasible to: a) Obtain the original message , given its message digest. b) Find two messages producing the same message digest.
  • 4. How SHA-1 works?  Step 1: Padding of Bits  Step 2: Append Length  Step 3: Divide the input into 512-bit blocks 1 0 1 1 0 1 0 0 0 0 0 0 0 0 …………………………… 0 0 0 0 1 1 0 Original string Padding of 0’s to 64 bits short of X 512 Length of message Total Message length multiple of 512
  • 5. How SHA-1 works cont…  Step 4: Initialize chaining variables  Step 5: Process Blocks- Now the actual algorithm begins…. Chaining Variables Hex values A 01 23 45 67 B 89 AB CD EF C FE DC BA 98 D 76 54 32 10 E C3 D2 E1 F0
  • 6. How SHA-1 works cont…  Step 5.1 : Copy chaining variables A-E into variables a-e.  Step 5.2 : Divide current 512-bit block into 16 sub-blocks of 32-bits.  Step 5.3 : SHA has 4 rounds, each consisting of 20 steps. Each round takes 3 inputs- • 512-bit block, • The register abcde • A constant K[t] (where t= 0 to 79) Round Value of t between 1 1 and 19 2 20 and 39 3 40 and 59 4 60 and 79
  • 7. How SHA-1 works cont…  Step 5.4 : SHA has a total of 80 iterations (4 rounds X 20 -iterations). Each iteration consists of following operations:- abcde = ( e +Process P + S5(a) + W[t] + K[t] ), a, S30(b) , c , d Where, abcde = The register made up of 5 variables a, b, c, d, e. Process P = The logic operation. St = Circular-left shift of 32-bit sub-block by t bits. W[t[ = A 32-bit derived from the current 32-bit sub-block. K[t] = One of the five additive constants.
  • 8. How SHA-1 works cont…  Process P in each SHA round Round Process P 1 (b AND c) OR (( NOT b) AND (d)) 2 b XOR c XOR d 3 (b AND c ) OR (b AND d) OR (c AND d) 4 b XOR c XOR d
  • 9. How SHA-1 works cont… Single SHA-1 iteration
  • 10. How SHA-1 works cont…  The values of W[t] are calculated as follows :  For the first 16 words of W (i.e. t=0 to 15) , the contents of the input message sub-block M[t] become the contents of W[t].  For the remaining 64 values of W are derived using the equation W[t] = s1 ( W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3])
  • 11. Comparison between MD5 and SHA-1 Point of discussion MD5 SHA-1 Message digest length in bits 128 160 Attack to try and find the original message given a message digest Requires 2128 operations to break in. Requires 2160 operations to break in, therefore more secure. Attack to try and find two messages producing same message digest Requires 264 operations to break in. Requires 280 operations to break in. Speed Faster Slower Successful attempts so far There have been reported attempts to some extent. No such claims so far.
  • 12. Parameters for various versions of SHA Parameter SHA-1 SHA-256 SHA-384 SHA-512 Message digest size(in bits) 160 256 384 512 Message size(in bits) <264 264 2128 2128 Block size (in bits) 512 512 1024 1024 Word size (in bits) 32 32 64 64 Steps in algorithm 80 64 80 80
  • 13. SHA-512  SHA-512 algorithm takes a message of length 2128 bits and produces a message digest of size 512 bits.  SHA-512 was closely modeled after SHA-1 , which itself is modeled on MD5.
  • 14. How SHA-512 works?  Step 1 : Padding of bits – 128 bits short of a multiple of 1024.  Step 2 : Append length.  Step 3 : Divide the input into 1024-bit blocks.  Step 4: Initialize chaining variables. A= 6A09E667F3BCC908 B= BB67AE8584CAA73B C= 3C6EF372FE94F82B D= A54FF53A5F1D36F1 E= 510E527FADE6821D F= 9B05688C2B3E6C1F G= 1F83D9ABFB41BD6B H= 5BE0CD19137E2179
  • 15. How SHA-512 works cont…  Step 5 : Process blocks.  Step 5.1 : Copy the variables A-H to a-h.  Step 5.2 : Divide the 1024-bit block into 16 sub-blocks of 64-bit each.  Step 5.3 : It takes 80 rounds with 1024-bit block, abcdefgh register and K[t] constant as three inputs. Each round consists of following operations: Temp1 = h + Ch(e,f,g) + Sum (e[i] for i=1 to 512) + W[t] + K[t] Temp2 = Sum (a[i] for i=0 to 512) + Maj(a,b,c) a = Temp1 + Temp2 b = a c = b
  • 16. How SHA-512 works cont… d = c e = d + Temp1 f = e g = f h = g Where, t = round number Ch (e,f,g) = (e AND f) XOR (NOT e AND g) Maj (a,b,c) = (a AND b) XOR (a AND c) XOR (b AND c) Sum (a[i]) = ROTR (a[i] by 28 bits) XOR ROTR (a[i] by 34 bits) XOR ROTR (a[i] by 39 bits) Sum (e[i]) = ROTR (e[i] by 14 bits) XOR ROTR (e[i] by 18 bits) XOR ROTR (e[i] by 41 bits)
  • 17. How SHA-512 works cont… ROTR(x) = Circular right shift, i.e. rotation , of the 64-bit array x by the specified no. of bits. W[t] = 64-bit word derived from the current 512-bit input block. K[t] = 64-bit additive constant. + (or Add) = Addition mod 264.  In case of values of W[t] , for the first 16 rounds (0 to 15) , the value of W[t] is equal to the corresponding word in the message block.  For the remaining 64 steps, the value W[t] is equal to the circular left shift by one bit of the XOR of the four preceding values of W[t] with two of them subjected to shift and rotate operations
  • 18. How SHA-512 works cont… Single SHA-512 iteration
  • 19. Conclusion  Developing Secure Hash Algorithm was initially major concern for defense authorities.  SHA produces message digest which has an application in digital signature.  In this way, this technique took a contributed in secure and robust encryption.
  • 20. Thank you for your attention! Encrypt Safe…