SlideShare a Scribd company logo
6
Most read
9
Most read
20
Most read
SECURE
HASH
ALGORITHM
Secure Hash Algorithm ( SHA )
 Secure Hash Algorithm (SHA) was developed
by NIST along with NSA.
 In 1993, SHA was published as a Federal
Information Processing Standard.
 It has following versions-
 SHA-0
 SHA-1
 SHA-2
 SHA-3
SHA-1
 It works for any input message that is less than 264 bits.
 The output of SHA is a message digest of 160 bits in length.
 This is designed to be computationally infeasible to:
a) Obtain the original message , given its message digest.
b) Find two messages producing the same message digest.
How SHA-1 works?
 Step 1: Padding of Bits
 Step 2: Append Length
 Step 3: Divide the input into 512-bit blocks
1 0 1 1 0 1 0 0 0 0 0 0 0 0 …………………………… 0 0 0 0 1 1 0
Original
string
Padding of 0’s to 64 bits short of X 512
Length of
message
Total Message length multiple of 512
How SHA-1 works cont…
 Step 4: Initialize chaining variables
 Step 5: Process Blocks- Now the actual algorithm
begins….
Chaining Variables Hex values
A 01 23 45 67
B 89 AB CD EF
C FE DC BA 98
D 76 54 32 10
E C3 D2 E1 F0
How SHA-1 works cont…
 Step 5.1 : Copy chaining variables A-E into variables a-e.
 Step 5.2 : Divide current 512-bit block into 16 sub-blocks of
32-bits.
 Step 5.3 : SHA has 4 rounds, each consisting of 20 steps.
Each round takes 3 inputs-
• 512-bit block,
• The register abcde
• A constant K[t] (where t= 0 to 79)
Round Value of t between
1 1 and 19
2 20 and 39
3 40 and 59
4 60 and 79
How SHA-1 works cont…
 Step 5.4 : SHA has a total of 80 iterations (4 rounds X 20
-iterations). Each iteration consists of following
operations:-
abcde = ( e +Process P + S5(a) + W[t] + K[t] ), a, S30(b) , c , d
Where,
abcde = The register made up of 5 variables a, b, c, d, e.
Process P = The logic operation.
St = Circular-left shift of 32-bit sub-block by t bits.
W[t[ = A 32-bit derived from the current 32-bit sub-block.
K[t] = One of the five additive constants.
How SHA-1 works cont…
 Process P in each SHA round
Round Process P
1 (b AND c) OR (( NOT b) AND (d))
2 b XOR c XOR d
3 (b AND c ) OR (b AND d) OR (c AND d)
4 b XOR c XOR d
How SHA-1 works cont…
Single SHA-1 iteration
How SHA-1 works cont…
 The values of W[t] are calculated as follows :
 For the first 16 words of W (i.e. t=0 to 15) , the contents of the input
message sub-block M[t] become the contents of W[t].
 For the remaining 64 values of W are derived using the equation
W[t] = s1 ( W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3])
Comparison between MD5 and SHA-1
Point of discussion MD5 SHA-1
Message digest length in
bits
128 160
Attack to try and find the
original message given a
message digest
Requires 2128 operations to
break in.
Requires 2160 operations to
break in, therefore more
secure.
Attack to try and find two
messages producing same
message digest
Requires 264 operations to
break in.
Requires 280 operations to
break in.
Speed Faster Slower
Successful attempts so far There have been reported
attempts to some extent.
No such claims so far.
Parameters for various versions of SHA
Parameter SHA-1 SHA-256 SHA-384 SHA-512
Message digest size(in
bits)
160 256 384 512
Message size(in bits) <264 264 2128 2128
Block size (in bits) 512 512 1024 1024
Word size (in bits) 32 32 64 64
Steps in algorithm 80 64 80 80
SHA-512
 SHA-512 algorithm takes a message of length
2128 bits and produces a message digest of size
512 bits.
 SHA-512 was closely modeled after SHA-1 ,
which itself is modeled on MD5.
How SHA-512 works?
 Step 1 : Padding of bits – 128 bits short of a multiple of
1024.
 Step 2 : Append length.
 Step 3 : Divide the input into 1024-bit blocks.
 Step 4: Initialize chaining variables.
A= 6A09E667F3BCC908 B= BB67AE8584CAA73B
C= 3C6EF372FE94F82B D= A54FF53A5F1D36F1
E= 510E527FADE6821D F= 9B05688C2B3E6C1F
G= 1F83D9ABFB41BD6B H= 5BE0CD19137E2179
How SHA-512 works cont…
 Step 5 : Process blocks.
 Step 5.1 : Copy the variables A-H to a-h.
 Step 5.2 : Divide the 1024-bit block into 16 sub-blocks of
64-bit each.
 Step 5.3 : It takes 80 rounds with 1024-bit block, abcdefgh
register and K[t] constant as three inputs.
Each round consists of following operations:
Temp1 = h + Ch(e,f,g) + Sum (e[i] for i=1 to 512) + W[t] + K[t]
Temp2 = Sum (a[i] for i=0 to 512) + Maj(a,b,c)
a = Temp1 + Temp2
b = a
c = b
How SHA-512 works cont…
d = c
e = d + Temp1
f = e
g = f
h = g
Where,
t = round number
Ch (e,f,g) = (e AND f) XOR (NOT e AND g)
Maj (a,b,c) = (a AND b) XOR (a AND c) XOR (b AND c)
Sum (a[i]) = ROTR (a[i] by 28 bits) XOR ROTR (a[i] by 34 bits)
XOR ROTR (a[i] by 39 bits)
Sum (e[i]) = ROTR (e[i] by 14 bits) XOR ROTR (e[i] by
18 bits) XOR ROTR (e[i] by 41 bits)
How SHA-512 works cont…
ROTR(x) = Circular right shift, i.e. rotation , of the 64-bit
array x by the specified no. of bits.
W[t] = 64-bit word derived from the current 512-bit input
block.
K[t] = 64-bit additive constant.
+ (or Add) = Addition mod 264.
 In case of values of W[t] , for the first 16 rounds (0 to 15) ,
the value of W[t] is equal to the corresponding word in the
message block.
 For the remaining 64 steps, the value W[t] is equal to the
circular left shift by one bit of the XOR of the four preceding
values of W[t] with two of them subjected to shift and rotate
operations
How SHA-512 works cont…
Single SHA-512 iteration
Conclusion
 Developing Secure Hash Algorithm was initially major
concern for defense authorities.
 SHA produces message digest which has an application
in digital signature.
 In this way, this technique took a contributed in secure
and robust encryption.
Thank you for your attention!
Encrypt Safe…
Ad

Recommended

SHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
 
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Distributed database
Distributed database
ReachLocal Services India
 
IP Security
IP Security
Keshab Nath
 
Rsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
 
Statistics for data science
Statistics for data science
zekeLabs Technologies
 
Computer ethics
Computer ethics
Jagan Nath
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)
VrundaBhavsar
 
Block Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Hash Function
Hash Function
Siddharth Srivastava
 
Cryptography.ppt
Cryptography.ppt
kusum sharma
 
Digital Signature Standard
Digital Signature Standard
Sou Jana
 
5. message authentication and hash function
5. message authentication and hash function
Chirag Patel
 
Hash Function
Hash Function
ssuserdfb2da
 
Message Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
 
Steganography
Steganography
Uttam Jain
 
5.1 mining data streams
5.1 mining data streams
Krish_ver2
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
RC4&RC5
RC4&RC5
Mohamed El-Serngawy
 
SHA 1 Algorithm.ppt
SHA 1 Algorithm.ppt
Rajapriya82
 
Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
Message authentication and hash function
Message authentication and hash function
omarShiekh1
 
Hash function
Hash function
Salman Memon
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Principles of public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Keymanagement of ipsec
Keymanagement of ipsec
PACHIYAPPAN PACHIYAPPAS
 
Secure hashing algorithm
Secure hashing algorithm
Karteek Paruchuri
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
daxesh chauhan
 

More Related Content

What's hot (20)

Block Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Hash Function
Hash Function
Siddharth Srivastava
 
Cryptography.ppt
Cryptography.ppt
kusum sharma
 
Digital Signature Standard
Digital Signature Standard
Sou Jana
 
5. message authentication and hash function
5. message authentication and hash function
Chirag Patel
 
Hash Function
Hash Function
ssuserdfb2da
 
Message Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
 
Steganography
Steganography
Uttam Jain
 
5.1 mining data streams
5.1 mining data streams
Krish_ver2
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
RC4&RC5
RC4&RC5
Mohamed El-Serngawy
 
SHA 1 Algorithm.ppt
SHA 1 Algorithm.ppt
Rajapriya82
 
Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
Message authentication and hash function
Message authentication and hash function
omarShiekh1
 
Hash function
Hash function
Salman Memon
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Principles of public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Keymanagement of ipsec
Keymanagement of ipsec
PACHIYAPPAN PACHIYAPPAS
 
Block Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Digital Signature Standard
Digital Signature Standard
Sou Jana
 
5. message authentication and hash function
5. message authentication and hash function
Chirag Patel
 
Message Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
 
Steganography
Steganography
Uttam Jain
 
5.1 mining data streams
5.1 mining data streams
Krish_ver2
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
SHA 1 Algorithm.ppt
SHA 1 Algorithm.ppt
Rajapriya82
 
Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
Message authentication and hash function
Message authentication and hash function
omarShiekh1
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Principles of public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 

Viewers also liked (9)

Secure hashing algorithm
Secure hashing algorithm
Karteek Paruchuri
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
daxesh chauhan
 
RSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
The MD5 hashing algorithm
The MD5 hashing algorithm
Bob Landstrom
 
MD5Algorithm
MD5Algorithm
Mirza Tarannum
 
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Dylan Field
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
Ajay Karri
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
DUET
 
Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
daxesh chauhan
 
RSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
The MD5 hashing algorithm
The MD5 hashing algorithm
Bob Landstrom
 
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Dylan Field
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
Ajay Karri
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
DUET
 
Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
 
Ad

Similar to Secure Hash Algorithm (20)

crypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.ppt
shuchiagarwal12
 
SHA
SHA
SubashiniRathinavel
 
Sha
Sha
ha123
 
SHA 1 Algorithm
SHA 1 Algorithm
Shiva RamDam
 
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
KanchanPatil34
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Hash mac algorithms
Hash mac algorithms
Fraboni Ec
 
Hash mac algorithms
Hash mac algorithms
Tony Nguyen
 
Hash mac algorithms
Hash mac algorithms
Luis Goldster
 
Hash mac algorithms
Hash mac algorithms
David Hoen
 
Hash mac algorithms
Hash mac algorithms
James Wong
 
Hash& mac algorithms
Hash& mac algorithms
Harry Potter
 
Hash mac algorithms
Hash mac algorithms
Young Alista
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
NAtional Institute of TEchnology Rourkela , Galgotias University
 
Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.
IOSR Journals
 
Hash Function & Analysis
Hash Function & Analysis
Pawandeep Kaur
 
The SHA Hashing Algorithm
The SHA Hashing Algorithm
Bob Landstrom
 
Secure Hashing Techniques - Introduction
Secure Hashing Techniques - Introduction
Udhayyagethan Mano
 
Secure Hash Algorithm (SHA 256) - Detailed Architecture
Secure Hash Algorithm (SHA 256) - Detailed Architecture
SaravananPalani22
 
crypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.ppt
shuchiagarwal12
 
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
KanchanPatil34
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Hash mac algorithms
Hash mac algorithms
Fraboni Ec
 
Hash mac algorithms
Hash mac algorithms
Tony Nguyen
 
Hash mac algorithms
Hash mac algorithms
David Hoen
 
Hash mac algorithms
Hash mac algorithms
James Wong
 
Hash& mac algorithms
Hash& mac algorithms
Harry Potter
 
Hash mac algorithms
Hash mac algorithms
Young Alista
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.
IOSR Journals
 
Hash Function & Analysis
Hash Function & Analysis
Pawandeep Kaur
 
The SHA Hashing Algorithm
The SHA Hashing Algorithm
Bob Landstrom
 
Secure Hashing Techniques - Introduction
Secure Hashing Techniques - Introduction
Udhayyagethan Mano
 
Secure Hash Algorithm (SHA 256) - Detailed Architecture
Secure Hash Algorithm (SHA 256) - Detailed Architecture
SaravananPalani22
 
Ad

Recently uploaded (20)

Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
Cadastral Maps
Cadastral Maps
Google
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
Introduction to Python Programming Language
Introduction to Python Programming Language
merlinjohnsy
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
Fatality due to Falls at Working at Height
Fatality due to Falls at Working at Height
ssuserb8994f
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
Cadastral Maps
Cadastral Maps
Google
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
Introduction to Python Programming Language
Introduction to Python Programming Language
merlinjohnsy
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
Fatality due to Falls at Working at Height
Fatality due to Falls at Working at Height
ssuserb8994f
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 

Secure Hash Algorithm

  • 2. Secure Hash Algorithm ( SHA )  Secure Hash Algorithm (SHA) was developed by NIST along with NSA.  In 1993, SHA was published as a Federal Information Processing Standard.  It has following versions-  SHA-0  SHA-1  SHA-2  SHA-3
  • 3. SHA-1  It works for any input message that is less than 264 bits.  The output of SHA is a message digest of 160 bits in length.  This is designed to be computationally infeasible to: a) Obtain the original message , given its message digest. b) Find two messages producing the same message digest.
  • 4. How SHA-1 works?  Step 1: Padding of Bits  Step 2: Append Length  Step 3: Divide the input into 512-bit blocks 1 0 1 1 0 1 0 0 0 0 0 0 0 0 …………………………… 0 0 0 0 1 1 0 Original string Padding of 0’s to 64 bits short of X 512 Length of message Total Message length multiple of 512
  • 5. How SHA-1 works cont…  Step 4: Initialize chaining variables  Step 5: Process Blocks- Now the actual algorithm begins…. Chaining Variables Hex values A 01 23 45 67 B 89 AB CD EF C FE DC BA 98 D 76 54 32 10 E C3 D2 E1 F0
  • 6. How SHA-1 works cont…  Step 5.1 : Copy chaining variables A-E into variables a-e.  Step 5.2 : Divide current 512-bit block into 16 sub-blocks of 32-bits.  Step 5.3 : SHA has 4 rounds, each consisting of 20 steps. Each round takes 3 inputs- • 512-bit block, • The register abcde • A constant K[t] (where t= 0 to 79) Round Value of t between 1 1 and 19 2 20 and 39 3 40 and 59 4 60 and 79
  • 7. How SHA-1 works cont…  Step 5.4 : SHA has a total of 80 iterations (4 rounds X 20 -iterations). Each iteration consists of following operations:- abcde = ( e +Process P + S5(a) + W[t] + K[t] ), a, S30(b) , c , d Where, abcde = The register made up of 5 variables a, b, c, d, e. Process P = The logic operation. St = Circular-left shift of 32-bit sub-block by t bits. W[t[ = A 32-bit derived from the current 32-bit sub-block. K[t] = One of the five additive constants.
  • 8. How SHA-1 works cont…  Process P in each SHA round Round Process P 1 (b AND c) OR (( NOT b) AND (d)) 2 b XOR c XOR d 3 (b AND c ) OR (b AND d) OR (c AND d) 4 b XOR c XOR d
  • 9. How SHA-1 works cont… Single SHA-1 iteration
  • 10. How SHA-1 works cont…  The values of W[t] are calculated as follows :  For the first 16 words of W (i.e. t=0 to 15) , the contents of the input message sub-block M[t] become the contents of W[t].  For the remaining 64 values of W are derived using the equation W[t] = s1 ( W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3])
  • 11. Comparison between MD5 and SHA-1 Point of discussion MD5 SHA-1 Message digest length in bits 128 160 Attack to try and find the original message given a message digest Requires 2128 operations to break in. Requires 2160 operations to break in, therefore more secure. Attack to try and find two messages producing same message digest Requires 264 operations to break in. Requires 280 operations to break in. Speed Faster Slower Successful attempts so far There have been reported attempts to some extent. No such claims so far.
  • 12. Parameters for various versions of SHA Parameter SHA-1 SHA-256 SHA-384 SHA-512 Message digest size(in bits) 160 256 384 512 Message size(in bits) <264 264 2128 2128 Block size (in bits) 512 512 1024 1024 Word size (in bits) 32 32 64 64 Steps in algorithm 80 64 80 80
  • 13. SHA-512  SHA-512 algorithm takes a message of length 2128 bits and produces a message digest of size 512 bits.  SHA-512 was closely modeled after SHA-1 , which itself is modeled on MD5.
  • 14. How SHA-512 works?  Step 1 : Padding of bits – 128 bits short of a multiple of 1024.  Step 2 : Append length.  Step 3 : Divide the input into 1024-bit blocks.  Step 4: Initialize chaining variables. A= 6A09E667F3BCC908 B= BB67AE8584CAA73B C= 3C6EF372FE94F82B D= A54FF53A5F1D36F1 E= 510E527FADE6821D F= 9B05688C2B3E6C1F G= 1F83D9ABFB41BD6B H= 5BE0CD19137E2179
  • 15. How SHA-512 works cont…  Step 5 : Process blocks.  Step 5.1 : Copy the variables A-H to a-h.  Step 5.2 : Divide the 1024-bit block into 16 sub-blocks of 64-bit each.  Step 5.3 : It takes 80 rounds with 1024-bit block, abcdefgh register and K[t] constant as three inputs. Each round consists of following operations: Temp1 = h + Ch(e,f,g) + Sum (e[i] for i=1 to 512) + W[t] + K[t] Temp2 = Sum (a[i] for i=0 to 512) + Maj(a,b,c) a = Temp1 + Temp2 b = a c = b
  • 16. How SHA-512 works cont… d = c e = d + Temp1 f = e g = f h = g Where, t = round number Ch (e,f,g) = (e AND f) XOR (NOT e AND g) Maj (a,b,c) = (a AND b) XOR (a AND c) XOR (b AND c) Sum (a[i]) = ROTR (a[i] by 28 bits) XOR ROTR (a[i] by 34 bits) XOR ROTR (a[i] by 39 bits) Sum (e[i]) = ROTR (e[i] by 14 bits) XOR ROTR (e[i] by 18 bits) XOR ROTR (e[i] by 41 bits)
  • 17. How SHA-512 works cont… ROTR(x) = Circular right shift, i.e. rotation , of the 64-bit array x by the specified no. of bits. W[t] = 64-bit word derived from the current 512-bit input block. K[t] = 64-bit additive constant. + (or Add) = Addition mod 264.  In case of values of W[t] , for the first 16 rounds (0 to 15) , the value of W[t] is equal to the corresponding word in the message block.  For the remaining 64 steps, the value W[t] is equal to the circular left shift by one bit of the XOR of the four preceding values of W[t] with two of them subjected to shift and rotate operations
  • 18. How SHA-512 works cont… Single SHA-512 iteration
  • 19. Conclusion  Developing Secure Hash Algorithm was initially major concern for defense authorities.  SHA produces message digest which has an application in digital signature.  In this way, this technique took a contributed in secure and robust encryption.
  • 20. Thank you for your attention! Encrypt Safe…