SlideShare a Scribd company logo
Information and Network Security:39
Secure Hash Algorithm (SHA)
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Secure Hash Algorithm
SHA originally designed by NIST & NSA in 1993
was revised in 1995 as SHA-1
US standard for use with DSA signature scheme
ïŹstandard is FIPS 180-1 1995, also Internet RFC3174
ïŹnb. the algorithm is SHA, the standard is SHS
based on design of MD4 with key differences
produces 160-bit hash values
recent 2005 results on security of SHA-1 have raised concerns on its
use in future applications
Secure Hash Algorithm
‱ In recent years, the most widely used hash function has been the
Secure Hash Algorithm (SHA).
‱ The Secure Hash Algorithm (SHA) was developed by the National
Institute of Standards and Technology (NIST) and published as a
federal information processing standard (FIPS 180) in 1993; a revised
version was issued as FIPS 180-1 in 1995 and is generally referred to
as SHA-1.
‱ The actual standards document is entitled Secure Hash Standard.
‱ SHA is based on the hash function MD4 and its design closely models
MD4. SHA-1 produces a hash value of 160 bits.
‱ In 2005, a research team described an attack in which two separate
messages could be found that deliver the same SHA-1 hash using
2^69 operations, far fewer than the 2^80 operations previously
thought needed to find a collision with an SHA-1 hash [WANG05].
‱ This result has hastened the transition to newer, longer versions of
SHA.
Revised Secure Hash Standard
NIST issued revision FIPS 180-2 in 2002
adds 3 additional versions of SHA
ïŹSHA-256, SHA-384, SHA-512
designed for compatibility with increased security provided by the
AES cipher
structure & detail is similar to SHA-1
hence analysis should be similar
but security levels are rather higher
Revised Secure Hash Standard
‱ In 2002, NIST produced a revised version of the standard, FIPS 180-2, that
defined three new versions of SHA, with hash value lengths of 256, 384,
and 512 bits, known as SHA-256, SHA-384, and SHA-512.
‱ Collectively, these hash algorithms are known as SHA-2. These new
versions have the same underlying structure and use the same types of
modular arithmetic and logical binary operations as SHA-1, hence analyses
should be similar.
‱ A revised document was issued as FIP PUB 180-3 in 2008, which added a
224-bit version. SHA-2 is also specified in RFC 4634, which essentially
duplicates the material in FIPS 180-3, but adds a C code implementation.
‱ In 2005, NIST announced the intention to phase out approval of SHA-1 and
move to a reliance on the other SHA versions by 2010.
SHA Versions
SHA-1 SHA-224 SHA-256 SHA-384 SHA-512
Message
digest size 160 224 256 384 512
Message size < 264 < 264 < 264 < 2128 < 2128
Block size 512 512 512 1024 1024
Word size 32 32 32 64 64
Number of
steps 80 64 64 80 80
SHA-512 Overview
SHA-512 Compression Function
heart of the algorithm
processing message in 1024-bit blocks
consists of 80 rounds
ïŹupdating a 512-bit buffer
ïŹusing a 64-bit value Wt derived from the current message block
ïŹand a round constant based on cube root of first 80 prime numbers
SHA-512 Compression Function
‱ The SHA-512 Compression Function is the heart of the algorithm. In
this Step 4, it processes the message in 1024-bit (128-word) blocks,
using a module that consists of 80 rounds, labeled F in Stallings Figure
‱ Each round takes as input the 512-bit buffer value, and updates the
contents of the buffer.
‱ At input to the first round, the buffer has the value of the
intermediate hash value.
‱ Each round t makes use of a 64-bit value Wt derived using a message
schedule from the current 1024-bit block being processed.
‱
SHA-512 Compression Function
‱ Each round also makes use of an additive constant Kt, based on the
fractional parts of the cube roots of the first eighty prime numbers.
‱ The constants provide a “randomized” set of 64-bit patterns, which
should eliminate any regularities in the input data.
‱ The output of the eightieth round is added to the input to the first
round to produce the final hash value for this message block, which
forms the input to the next iteration of this compression function, as
shown on the previous slide.
SHA-512 Round Function
SHA-512 Round Function
Assignment
‱ What is Secure Hash Algorithm SHA
‱ In SHA-512, what is the minimum and maximum number of padding
bits that can be added to a message

More Related Content

PDF
Ipv6 packet fomat
PPT
Types of ip address classes
PPTX
IPV6 Introduction
 
PPTX
Sub Netting
PPT
Unit05
PPTX
Overview of Storage and Indexing ...
PPT
How IP address works
PPTX
Secure Hash Authentication in Network Security.pptx
Ipv6 packet fomat
Types of ip address classes
IPV6 Introduction
 
Sub Netting
Unit05
Overview of Storage and Indexing ...
How IP address works
Secure Hash Authentication in Network Security.pptx

Similar to Information and network security 39 secure hash algorithm (20)

PPT
crypto secure-hash-algorithm-versions.ppt
PDF
Sha
 
PPTX
Secure Hash Algorithm
PDF
The SHA Hashing Algorithm
PDF
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
PDF
Hash Functions - Uses, Requirements, Secure Hash Algorithm
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash& mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PDF
IRJET- Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2...
PPT
An Introduction to Hashing: A basic understanding
PPTX
Network Security Unit-2 topic Part-2.pptx
PPTX
Secure Hashing Techniques - Introduction
PPT
01204427-Hash_Crypto (1).ppt
PPT
Hash_Crypto.ppt
crypto secure-hash-algorithm-versions.ppt
Sha
 
Secure Hash Algorithm
The SHA Hashing Algorithm
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
Hash Functions - Uses, Requirements, Secure Hash Algorithm
Hash mac algorithms
Hash mac algorithms
Hash mac algorithms
Hash mac algorithms
Hash& mac algorithms
Hash mac algorithms
Hash mac algorithms
IRJET- Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2...
An Introduction to Hashing: A basic understanding
Network Security Unit-2 topic Part-2.pptx
Secure Hashing Techniques - Introduction
01204427-Hash_Crypto (1).ppt
Hash_Crypto.ppt
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 47 authentication applications
PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
PPTX
Information and network security 26 aes decryption and implementational issues
Information and network security 47 authentication applications
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des
Information and network security 26 aes decryption and implementational issues
Ad

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
System and Network Administration Chapter 2
PPTX
history of c programming in notes for students .pptx
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Digital Strategies for Manufacturing Companies
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
AI in Product Development-omnex systems
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
PTS Company Brochure 2025 (1).pdf.......
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
System and Network Administration Chapter 2
history of c programming in notes for students .pptx
2025 Textile ERP Trends: SAP, Odoo & Oracle
Odoo Companies in India – Driving Business Transformation.pdf
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Wondershare Filmora 15 Crack With Activation Key [2025
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Navsoft: AI-Powered Business Solutions & Custom Software Development
VVF-Customer-Presentation2025-Ver1.9.pptx
Digital Strategies for Manufacturing Companies
Which alternative to Crystal Reports is best for small or large businesses.pdf
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Odoo POS Development Services by CandidRoot Solutions
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Operating system designcfffgfgggggggvggggggggg
Softaken Excel to vCard Converter Software.pdf
AI in Product Development-omnex systems
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PTS Company Brochure 2025 (1).pdf.......

Information and network security 39 secure hash algorithm

  • 1. Information and Network Security:39 Secure Hash Algorithm (SHA) Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Secure Hash Algorithm SHA originally designed by NIST & NSA in 1993 was revised in 1995 as SHA-1 US standard for use with DSA signature scheme ïŹstandard is FIPS 180-1 1995, also Internet RFC3174 ïŹnb. the algorithm is SHA, the standard is SHS based on design of MD4 with key differences produces 160-bit hash values recent 2005 results on security of SHA-1 have raised concerns on its use in future applications
  • 3. Secure Hash Algorithm ‱ In recent years, the most widely used hash function has been the Secure Hash Algorithm (SHA). ‱ The Secure Hash Algorithm (SHA) was developed by the National Institute of Standards and Technology (NIST) and published as a federal information processing standard (FIPS 180) in 1993; a revised version was issued as FIPS 180-1 in 1995 and is generally referred to as SHA-1. ‱ The actual standards document is entitled Secure Hash Standard.
  • 4. ‱ SHA is based on the hash function MD4 and its design closely models MD4. SHA-1 produces a hash value of 160 bits. ‱ In 2005, a research team described an attack in which two separate messages could be found that deliver the same SHA-1 hash using 2^69 operations, far fewer than the 2^80 operations previously thought needed to find a collision with an SHA-1 hash [WANG05]. ‱ This result has hastened the transition to newer, longer versions of SHA.
  • 5. Revised Secure Hash Standard NIST issued revision FIPS 180-2 in 2002 adds 3 additional versions of SHA ïŹSHA-256, SHA-384, SHA-512 designed for compatibility with increased security provided by the AES cipher structure & detail is similar to SHA-1 hence analysis should be similar but security levels are rather higher
  • 6. Revised Secure Hash Standard ‱ In 2002, NIST produced a revised version of the standard, FIPS 180-2, that defined three new versions of SHA, with hash value lengths of 256, 384, and 512 bits, known as SHA-256, SHA-384, and SHA-512. ‱ Collectively, these hash algorithms are known as SHA-2. These new versions have the same underlying structure and use the same types of modular arithmetic and logical binary operations as SHA-1, hence analyses should be similar. ‱ A revised document was issued as FIP PUB 180-3 in 2008, which added a 224-bit version. SHA-2 is also specified in RFC 4634, which essentially duplicates the material in FIPS 180-3, but adds a C code implementation. ‱ In 2005, NIST announced the intention to phase out approval of SHA-1 and move to a reliance on the other SHA versions by 2010.
  • 7. SHA Versions SHA-1 SHA-224 SHA-256 SHA-384 SHA-512 Message digest size 160 224 256 384 512 Message size < 264 < 264 < 264 < 2128 < 2128 Block size 512 512 512 1024 1024 Word size 32 32 32 64 64 Number of steps 80 64 64 80 80
  • 9. SHA-512 Compression Function heart of the algorithm processing message in 1024-bit blocks consists of 80 rounds ïŹupdating a 512-bit buffer ïŹusing a 64-bit value Wt derived from the current message block ïŹand a round constant based on cube root of first 80 prime numbers
  • 10. SHA-512 Compression Function ‱ The SHA-512 Compression Function is the heart of the algorithm. In this Step 4, it processes the message in 1024-bit (128-word) blocks, using a module that consists of 80 rounds, labeled F in Stallings Figure ‱ Each round takes as input the 512-bit buffer value, and updates the contents of the buffer. ‱ At input to the first round, the buffer has the value of the intermediate hash value. ‱ Each round t makes use of a 64-bit value Wt derived using a message schedule from the current 1024-bit block being processed. ‱
  • 11. SHA-512 Compression Function ‱ Each round also makes use of an additive constant Kt, based on the fractional parts of the cube roots of the first eighty prime numbers. ‱ The constants provide a “randomized” set of 64-bit patterns, which should eliminate any regularities in the input data. ‱ The output of the eightieth round is added to the input to the first round to produce the final hash value for this message block, which forms the input to the next iteration of this compression function, as shown on the previous slide.
  • 14. Assignment ‱ What is Secure Hash Algorithm SHA ‱ In SHA-512, what is the minimum and maximum number of padding bits that can be added to a message