SlideShare a Scribd company logo
Network Security
CS-6(CH11-12)
By: Prof. Ganesh Ingle
Session 2 objective
CS-5 Revision Previous Session revision
CS -6 Modes of Operation and its applications
CS – 6 Hash Functions and Properties, Secure Hash Algorithms
(SHA),Message Authentication Codes (MAC)
CS -6 SHA-1 and SHA-3
CS-6 HMAC and CBC-MAC and its Security
SUMMARY
CS -6 Modes of Operation & its applications
CS -6 Modes of Operation & its applications
CS -6 Modes of Operation & its applications
CS -6 Modes of Operation & its applications
CS -6 Modes of Operation & its applications
CS -6 Modes of Operation & its applications
CS -6 Message authentication & types
CS -6 Message authentication & types
CS -6 Message authentication & types
CS -6 Message authentication & types
Message Encryption
CS -6 Message authentication & types
Message Encryption
CS -6 Message authentication & types
Message Encryption:
CS -6 Message authentication & types
Message Authentication code:
CS -6 Message authentication & types
Message Authentication code:
CS -6 Message authentication & types
Basic Hash Function:
CS -6 Message authentication & types
Hash Function: Types of Hash Functions
CS -6 SHA 1
Message Diagram
CS -6 SHA 1
Message Diagram
CS -6 SHA 1
Message Diagram
CS -6 SHA 1
 SHA-1 (160 bit message)
 Step 1: Append Padding Bits….
Message is “padded” with a 1 and as many 0’s
as necessary to bring the message length to
64 bits fewer than an even multiple of 512.
 Step 2: Append Length....
64 bits are appended to the end of the padded
message. These bits hold the binary format of 64
bits indicating the length of the original message.
CS -6 SHA 1
 Step 3: Prepare Processing Functions….
SHA1 requires 80 processing functions defined as:
f(t;B,C,D) = (B AND C) OR ((NOT B) AND D) ( 0 <= t <= 19)
f(t;B,C,D) = B XOR C XOR D (20 <= t <= 39)
f(t;B,C,D) = (B AND C) OR (B AND D) OR (C AND D) (40 <= t
<=59)
f(t;B,C,D) = B XOR C XOR D (60 <= t <= 79)
 Step 4: Prepare Processing Constants....
SHA1 requires 80 processing constant words defined
as:
K(t) = 0x5A827999 ( 0 <= t <= 19)
K(t) = 0x6ED9EBA1 (20 <= t <= 39)
K(t) = 0x8F1BBCDC (40 <= t <= 59)
K(t) = 0xCA62C1D6 (60 <= t <= 79)
CS -6 SHA 1
 Step 5: Initialize Buffers….
SHA1 requires 160 bits or 5 buffers of words (32 bits):
H0 = 0x67452301
H1 = 0xEFCDAB89
H2 = 0x98BADCFE
H3 = 0x10325476
H4 = 0xC3D2E1F0
 Step 6: Processing Message in 512-bit blocks (L blocks in
total message)….
This is the main task of SHA1 algorithm which loops through the padded
and appended message in 512-bit blocks.
Input and predefined functions:
M[1, 2, ..., L]: Blocks of the padded and appended message f(0;B,C,D),
f(1,B,C,D), ..., f(79,B,C,D): 80 Processing Functions K(0), K(1), ..., K(79):
80 Processing Constant Words
H0, H1, H2, H3, H4, H5: 5 Word buffers with initial values
CS -6 SHA 3
CS -6 SHA 3
CS -6 SHA 3
CS -6 SHA 3
CS -6 SHA 3
CS -6 SHA 3
CS -6 SHA 3
CS -6 SHA 3
CS -6 SHA 3
CS -6 SHA 3
Thank you
Image Source
searchenterpriseai.techtarget.com
wikipedia

More Related Content

PDF
Programming with matlab session 1
PDF
Network Security CS3-4
PDF
Network security cs5
PDF
Network security CS2
PPTX
Intro to Matlab programming
PPTX
10. Recursion
PDF
Ntewrok secuirty cs7
PPTX
Introduction to matlab lecture 3 of 4
Programming with matlab session 1
Network Security CS3-4
Network security cs5
Network security CS2
Intro to Matlab programming
10. Recursion
Ntewrok secuirty cs7
Introduction to matlab lecture 3 of 4

What's hot (20)

PPTX
19. Java data structures algorithms and complexity
PPTX
Intro to matlab
PPTX
Dag representation of basic blocks
PPTX
Introduction to matlab lecture 2 of 4
PPT
Introduction to MATLAB
PPTX
Generating code from dags
PPTX
16. Arrays Lists Stacks Queues
PDF
MATLAB for Technical Computing
PPT
Parameters
PPTX
07. Arrays
PPTX
Introduction to matlab lecture 4 of 4
PPTX
12. Exception Handling
PPTX
09. Methods
PPTX
matlab
PPTX
20.1 Java working with abstraction
PPTX
19. Data Structures and Algorithm Complexity
PPTX
13. Java text processing
PPT
Ch02 primitive-data-definite-loops
19. Java data structures algorithms and complexity
Intro to matlab
Dag representation of basic blocks
Introduction to matlab lecture 2 of 4
Introduction to MATLAB
Generating code from dags
16. Arrays Lists Stacks Queues
MATLAB for Technical Computing
Parameters
07. Arrays
Introduction to matlab lecture 4 of 4
12. Exception Handling
09. Methods
matlab
20.1 Java working with abstraction
19. Data Structures and Algorithm Complexity
13. Java text processing
Ch02 primitive-data-definite-loops
Ad

Similar to Network security CS6 (20)

PPT
SHA 1 Algorithm.ppt
PPT
Secure hashing algorithm
PPT
crypto secure-hash-algorithm-versions.ppt
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PPT
Hash& mac algorithms
PPT
Hash mac algorithms
PPT
Hash mac algorithms
PDF
Cns
PPTX
5. message authentication and hash function
PPTX
Secure Hash Authentication in Network Security.pptx
PPTX
Secure Hash Algorithm
PDF
Sha
PDF
SHA 1 Algorithm
PDF
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
PDF
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
PPT
An Introduction to Hashing: A basic understanding
SHA 1 Algorithm.ppt
Secure hashing algorithm
crypto secure-hash-algorithm-versions.ppt
Hash mac algorithms
Hash mac algorithms
Hash mac algorithms
Hash mac algorithms
Hash& mac algorithms
Hash mac algorithms
Hash mac algorithms
Cns
5. message authentication and hash function
Secure Hash Authentication in Network Security.pptx
Secure Hash Algorithm
Sha
SHA 1 Algorithm
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
An Introduction to Hashing: A basic understanding
Ad

More from Infinity Tech Solutions (20)

PDF
Database management system session 6
PDF
Database management system session 5
PDF
Database Management System-session 3-4-5
PDF
Database Management System-session1-2
PDF
Main topic 3 problem solving and office automation
PDF
Introduction to c programming
PDF
PDF
Bds session 13 14
PDF
Computer memory, Types of programming languages
PDF
Basic hardware familiarization
PDF
User defined functions in matlab
PDF
Programming with matlab session 6
PDF
Programming with matlab session 3 notes
PPTX
AI/ML/DL/BCT A Revolution in Maritime Sector
PDF
Programming with matlab session 5 looping
PDF
BIG DATA Session 7 8
PDF
BIG DATA Session 6
PDF
Database management system session 6
Database management system session 5
Database Management System-session 3-4-5
Database Management System-session1-2
Main topic 3 problem solving and office automation
Introduction to c programming
Bds session 13 14
Computer memory, Types of programming languages
Basic hardware familiarization
User defined functions in matlab
Programming with matlab session 6
Programming with matlab session 3 notes
AI/ML/DL/BCT A Revolution in Maritime Sector
Programming with matlab session 5 looping
BIG DATA Session 7 8
BIG DATA Session 6

Recently uploaded (20)

PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
PPT on Performance Review to get promotions
PPTX
Geodesy 1.pptx...............................................
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPT
Mechanical Engineering MATERIALS Selection
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
web development for engineering and engineering
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
additive manufacturing of ss316l using mig welding
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
OOP with Java - Java Introduction (Basics)
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
Digital Logic Computer Design lecture notes
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT on Performance Review to get promotions
Geodesy 1.pptx...............................................
R24 SURVEYING LAB MANUAL for civil enggi
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
bas. eng. economics group 4 presentation 1.pptx
Mechanical Engineering MATERIALS Selection
Model Code of Practice - Construction Work - 21102022 .pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
web development for engineering and engineering
Foundation to blockchain - A guide to Blockchain Tech
additive manufacturing of ss316l using mig welding
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
OOP with Java - Java Introduction (Basics)

Network security CS6

  • 2. Session 2 objective CS-5 Revision Previous Session revision CS -6 Modes of Operation and its applications CS – 6 Hash Functions and Properties, Secure Hash Algorithms (SHA),Message Authentication Codes (MAC) CS -6 SHA-1 and SHA-3 CS-6 HMAC and CBC-MAC and its Security SUMMARY
  • 3. CS -6 Modes of Operation & its applications
  • 4. CS -6 Modes of Operation & its applications
  • 5. CS -6 Modes of Operation & its applications
  • 6. CS -6 Modes of Operation & its applications
  • 7. CS -6 Modes of Operation & its applications
  • 8. CS -6 Modes of Operation & its applications
  • 9. CS -6 Message authentication & types
  • 10. CS -6 Message authentication & types
  • 11. CS -6 Message authentication & types
  • 12. CS -6 Message authentication & types Message Encryption
  • 13. CS -6 Message authentication & types Message Encryption
  • 14. CS -6 Message authentication & types Message Encryption:
  • 15. CS -6 Message authentication & types Message Authentication code:
  • 16. CS -6 Message authentication & types Message Authentication code:
  • 17. CS -6 Message authentication & types Basic Hash Function:
  • 18. CS -6 Message authentication & types Hash Function: Types of Hash Functions
  • 19. CS -6 SHA 1 Message Diagram
  • 20. CS -6 SHA 1 Message Diagram
  • 21. CS -6 SHA 1 Message Diagram
  • 22. CS -6 SHA 1  SHA-1 (160 bit message)  Step 1: Append Padding Bits…. Message is “padded” with a 1 and as many 0’s as necessary to bring the message length to 64 bits fewer than an even multiple of 512.  Step 2: Append Length.... 64 bits are appended to the end of the padded message. These bits hold the binary format of 64 bits indicating the length of the original message.
  • 23. CS -6 SHA 1  Step 3: Prepare Processing Functions…. SHA1 requires 80 processing functions defined as: f(t;B,C,D) = (B AND C) OR ((NOT B) AND D) ( 0 <= t <= 19) f(t;B,C,D) = B XOR C XOR D (20 <= t <= 39) f(t;B,C,D) = (B AND C) OR (B AND D) OR (C AND D) (40 <= t <=59) f(t;B,C,D) = B XOR C XOR D (60 <= t <= 79)  Step 4: Prepare Processing Constants.... SHA1 requires 80 processing constant words defined as: K(t) = 0x5A827999 ( 0 <= t <= 19) K(t) = 0x6ED9EBA1 (20 <= t <= 39) K(t) = 0x8F1BBCDC (40 <= t <= 59) K(t) = 0xCA62C1D6 (60 <= t <= 79)
  • 24. CS -6 SHA 1  Step 5: Initialize Buffers…. SHA1 requires 160 bits or 5 buffers of words (32 bits): H0 = 0x67452301 H1 = 0xEFCDAB89 H2 = 0x98BADCFE H3 = 0x10325476 H4 = 0xC3D2E1F0  Step 6: Processing Message in 512-bit blocks (L blocks in total message)…. This is the main task of SHA1 algorithm which loops through the padded and appended message in 512-bit blocks. Input and predefined functions: M[1, 2, ..., L]: Blocks of the padded and appended message f(0;B,C,D), f(1,B,C,D), ..., f(79,B,C,D): 80 Processing Functions K(0), K(1), ..., K(79): 80 Processing Constant Words H0, H1, H2, H3, H4, H5: 5 Word buffers with initial values