SlideShare a Scribd company logo
Information and Network Security:40
SHA 3 Secure Hash Algorithm
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
SHA-3
• SHA-1 not yet "broken”
• but similar to broken MD5 & SHA-0
• so considered insecure
• SHA-2 (esp. SHA-512) seems secure
• shares same structure and mathematical operations as
predecessors so have concern
• NIST announced in 2007 a competition for the SHA-3
next gen NIST hash function
• goal to have in place by 2012 but not fixed
SHA-3
• As yet, SHA-1 has not yet been "broken".
• That is, no one has demonstrated a technique for producing collisions
in less than brute-force time.
• However, because SHA-1 is very similar in structure and in the basic
mathematical operations used to MD5 and SHA-0, both of which have
been broken, SHA-1 is considered insecure and has been phased out
for SHA-2.
SHA-3
• SHA-2, particularly the 512-bit version, would appear to provide
unassailable security.
• However, SHA-2 shares the same structure and mathematical
operations as its predecessors, and this is a cause for concern.
• Because it will take years to find a suitable replacement for SHA-2,
should it become vulnerable, NIST decided to begin the process of
developing a new hash standard.
SHA-3
• Accordingly, NIST announced in 2007 a competition to produce the
next generation NIST hash function, to be called SHA-3.
• NIST would like to have a new standard in place by the end of 2012,
but emphasizes that this is not a fixed timeline.
SHA-3 Requirements
replace SHA-2 with SHA-3 in any use
so use same hash sizes
preserve the online nature of SHA-2
so must process small blocks (512 / 1024 bits)
evaluation criteria
security close to theoretical max for hash sizes
cost in time & memory
characteristics: such as flexibility & simplicity
SHA-3 Requirements
• The basic requirements that must be satisfied by any candidate for
SHA-3 are:
• It must be possible to replace SHA-2 with SHA-3 in any application by
a simple drop-in substitution. Therefore, SHA-3 must support hash
value lengths of 224, 256, 384, and 512 bits.
• SHA-3 must preserve the online nature of SHA-2. That is, the
algorithm must process comparatively small blocks (512 or 1024 bits)
at a time instead of requiring that the entire message be buffered in
memory before
SHA-3 Requirements
• Beyond these basic requirements, NIST has defined a set of
evaluation criteria. These criteria are designed to reflect the
requirements for the main applications supported by SHA-2, and are:
• • Security: The strength of SHA-3 should be close to the theoretical
maximum for the different required hash sizes, and for both preimage
resistance and collision resistance. SHA-3 algorithms must be
designed to resist any potentially successful attack on SHA-2 functions
SHA-3 Requirements
• • Cost: be both time and memory efficient over a range of hardware
platforms.
• • Algorithm and implementation characteristics: such as flexibility
(e.g., tunable parameters for security/performance tradeoffs,
opportunity for parallelization, and so on), and simplicity (which
makes it easier to analyze the security properties of the algorithm)
Assignment
• What is SHA 3 Secure Hash Algorithm
• Discuss the requirements of SHA 3

More Related Content

PPTX
Secure Hash Authentication in Network Security.pptx
PPTX
Information and network security 39 secure hash algorithm
PDF
The SHA Hashing Algorithm
PPTX
PDF
Design of Secure Hash Algorithm(SHA)
PPTX
Information and data security cryptographic hash functions
PPT
HMAC&CMAC.ppt
PPT
ch12.ppt
Secure Hash Authentication in Network Security.pptx
Information and network security 39 secure hash algorithm
The SHA Hashing Algorithm
Design of Secure Hash Algorithm(SHA)
Information and data security cryptographic hash functions
HMAC&CMAC.ppt
ch12.ppt

Similar to Information and network security 40 sha3 secure hash algorithm (20)

PPT
SHA 3 algorithm introduction, diagram, design
PPTX
Secure Hash Algorithm (SHA)
PDF
Sha
PPT
crypto secure-hash-algorithm-versions.ppt
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash& mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPTX
Secure Hash Algorithm
PPT
presentation on keccak algorithm functionality
PPT
keccak.ppt that is about introduction and basics
PPT
secure hash function for authentication in CNS
PPT
NSC_Unit-III_final.ppt
PDF
cryptography summary hash function slides
PDF
Hash Functions - Uses, Requirements, Secure Hash Algorithm
PDF
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PDF
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
SHA 3 algorithm introduction, diagram, design
Secure Hash Algorithm (SHA)
Sha
crypto secure-hash-algorithm-versions.ppt
Hash mac algorithms
Hash mac algorithms
Hash mac algorithms
Hash mac algorithms
Hash& mac algorithms
Hash mac algorithms
Hash mac algorithms
Secure Hash Algorithm
presentation on keccak algorithm functionality
keccak.ppt that is about introduction and basics
secure hash function for authentication in CNS
NSC_Unit-III_final.ppt
cryptography summary hash function slides
Hash Functions - Uses, Requirements, Secure Hash Algorithm
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 47 authentication applications
PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
PPTX
Information and network security 26 aes decryption and implementational issues
PPTX
Information and network security 25 algorithmic steps of aes
Information and network security 47 authentication applications
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des
Information and network security 26 aes decryption and implementational issues
Information and network security 25 algorithmic steps of aes
Ad

Recently uploaded (20)

PDF
System and Network Administraation Chapter 3
PPTX
Transform Your Business with a Software ERP System
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
medical staffing services at VALiNTRY
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Digital Strategies for Manufacturing Companies
PPTX
L1 - Introduction to python Backend.pptx
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPT
Introduction Database Management System for Course Database
System and Network Administraation Chapter 3
Transform Your Business with a Software ERP System
How to Choose the Right IT Partner for Your Business in Malaysia
medical staffing services at VALiNTRY
ISO 45001 Occupational Health and Safety Management System
Navsoft: AI-Powered Business Solutions & Custom Software Development
Digital Strategies for Manufacturing Companies
L1 - Introduction to python Backend.pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Softaken Excel to vCard Converter Software.pdf
Design an Analysis of Algorithms II-SECS-1021-03
ManageIQ - Sprint 268 Review - Slide Deck
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
How to Migrate SBCGlobal Email to Yahoo Easily
How Creative Agencies Leverage Project Management Software.pdf
Operating system designcfffgfgggggggvggggggggg
Design an Analysis of Algorithms I-SECS-1021-03
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Introduction Database Management System for Course Database

Information and network security 40 sha3 secure hash algorithm

  • 1. Information and Network Security:40 SHA 3 Secure Hash Algorithm Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. SHA-3 • SHA-1 not yet "broken” • but similar to broken MD5 & SHA-0 • so considered insecure • SHA-2 (esp. SHA-512) seems secure • shares same structure and mathematical operations as predecessors so have concern • NIST announced in 2007 a competition for the SHA-3 next gen NIST hash function • goal to have in place by 2012 but not fixed
  • 3. SHA-3 • As yet, SHA-1 has not yet been "broken". • That is, no one has demonstrated a technique for producing collisions in less than brute-force time. • However, because SHA-1 is very similar in structure and in the basic mathematical operations used to MD5 and SHA-0, both of which have been broken, SHA-1 is considered insecure and has been phased out for SHA-2.
  • 4. SHA-3 • SHA-2, particularly the 512-bit version, would appear to provide unassailable security. • However, SHA-2 shares the same structure and mathematical operations as its predecessors, and this is a cause for concern. • Because it will take years to find a suitable replacement for SHA-2, should it become vulnerable, NIST decided to begin the process of developing a new hash standard.
  • 5. SHA-3 • Accordingly, NIST announced in 2007 a competition to produce the next generation NIST hash function, to be called SHA-3. • NIST would like to have a new standard in place by the end of 2012, but emphasizes that this is not a fixed timeline.
  • 6. SHA-3 Requirements replace SHA-2 with SHA-3 in any use so use same hash sizes preserve the online nature of SHA-2 so must process small blocks (512 / 1024 bits) evaluation criteria security close to theoretical max for hash sizes cost in time & memory characteristics: such as flexibility & simplicity
  • 7. SHA-3 Requirements • The basic requirements that must be satisfied by any candidate for SHA-3 are: • It must be possible to replace SHA-2 with SHA-3 in any application by a simple drop-in substitution. Therefore, SHA-3 must support hash value lengths of 224, 256, 384, and 512 bits. • SHA-3 must preserve the online nature of SHA-2. That is, the algorithm must process comparatively small blocks (512 or 1024 bits) at a time instead of requiring that the entire message be buffered in memory before
  • 8. SHA-3 Requirements • Beyond these basic requirements, NIST has defined a set of evaluation criteria. These criteria are designed to reflect the requirements for the main applications supported by SHA-2, and are: • • Security: The strength of SHA-3 should be close to the theoretical maximum for the different required hash sizes, and for both preimage resistance and collision resistance. SHA-3 algorithms must be designed to resist any potentially successful attack on SHA-2 functions
  • 9. SHA-3 Requirements • • Cost: be both time and memory efficient over a range of hardware platforms. • • Algorithm and implementation characteristics: such as flexibility (e.g., tunable parameters for security/performance tradeoffs, opportunity for parallelization, and so on), and simplicity (which makes it easier to analyze the security properties of the algorithm)
  • 10. Assignment • What is SHA 3 Secure Hash Algorithm • Discuss the requirements of SHA 3