SlideShare a Scribd company logo
4
Most read
8
Most read
9
Most read
Cryptographic Hash
Functions
Each of the messages, like each one he had ever
read of Stern's commands, began with a number
and ended with a number or row of numbers. No
efforts on the part of Mungo or any of his experts
had been able to break Stern's code, nor was
there any clue as to what the preliminary
number and those ultimate numbers signified.
—Talking to Strange Men, Ruth Rendell
Hash Functions
➢ condenses arbitrary message to fixed size
h = H(M)
➢ usually assume hash function is public
➢ hash used to detect changes to message
➢ want a cryptographic hash function
⚫ computationally infeasible to find data mapping
to specific hash (one-way property)
⚫ computationally infeasible to find two data to
same hash (collision-free property)
Cryptographic Hash Function
Hash Function Uses
➢ Message Integrity Check (MIC)
⚫ send hash of message (digest)
⚫ MIC always encrypted, message optionally
➢ Message Authentication Code (MAC)
⚫ send keyed hash of message
⚫ MAC, message optionally encrypted
➢ Digital Signature (non-repudiation)
⚫ Encrypt hash with private (signing) key
⚫ Verify with public (verification) key
Hash Functions & Message
Authentication
Symmetric Key
Unkeyed Hash
a) Message
encrypted
b) Message
unencrypted
Hash Functions & Message
Authentication
Symmetric Key
Keyed Hash
a) Message
unencrypted
d) Message
encrypted
Hash Functions & Digital
Signatures - PKCS
More Hash Function Uses
➢ to create a one-way password file
⚫ store hash of password not actual password
⚫ e.g., Unix, Windows NT, etc.
⚫ salt to deter precomputation attacks
⚫ Rainbow tables
➢ for intrusion detection and virus detection
⚫ keep & check hash of files on system
⚫ e.g., Tripwire
Hash Function Requirements
Secure Hash Algorithm
➢ SHA originally designed by NIST & NSA in 1993
➢ was revised in 1995 as SHA-1
➢ US standard for use with DSA signature scheme
⚫ standard is FIPS 180-1 1995, also Internet RFC3174
⚫ nb. the algorithm is SHA, the standard is SHS
➢ based on design of MD4 with key differences
➢ produces 160-bit hash values
➢ 2005 results on security of SHA-1 raised
concerns on its use in future applications
Revised Secure Hash
Standard
➢ NIST issued revision FIPS 180-2 in 2002
➢ adds 3 additional versions of SHA
⚫ SHA-256, SHA-384, SHA-512
➢ designed for compatibility with increased
security provided by the AES cipher
➢ structure & detail is similar to SHA-1
➢ hence analysis should be similar
➢ but security levels are rather higher
SHA Versions
SHA-512 Overview
SHA-512 Processing of a Single 1024-Bit Block
SHA-512 Compression
Function
➢ heart of the algorithm
➢ processing message in 1024-bit blocks
➢ consists of 80 rounds
⚫ updating a 512-bit buffer
⚫ using a 64-bit value Wt derived from the
current message block
⚫ and a round constant based on cube root of
first 80 prime numbers
SHA-512 Round Function
SHA-512 Round Function
Summary
➢ have considered:
⚫ hash functions
• uses, requirements, security
⚫ SHA-512
Ad

Recommended

cryptography and network security cns.pptx
cryptography and network security cns.pptx
gkumar610
 
Cryptography-Hash-Functions.pptx
Cryptography-Hash-Functions.pptx
AngeloChangcoco
 
Hash Function
Hash Function
ssuserdfb2da
 
Hash_Crypto.ppt
Hash_Crypto.ppt
ssuser5297f5
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
GnanalakshmiV
 
secure hash function for authentication in CNS
secure hash function for authentication in CNS
NithyasriA2
 
Hash Function & Analysis
Hash Function & Analysis
Pawandeep Kaur
 
Hash crypto
Hash crypto
Fraboni Ec
 
Hash crypto
Hash crypto
Harry Potter
 
Hash crypto
Hash crypto
Luis Goldster
 
Hash crypto
Hash crypto
David Hoen
 
Hash crypto
Hash crypto
Tony Nguyen
 
Hash crypto
Hash crypto
James Wong
 
Hash crypto
Hash crypto
Young Alista
 
Sha
Sha
ha123
 
NSC_Unit-III_final.ppt
NSC_Unit-III_final.ppt
DrVASAVIBANDE
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functions
Dr.Florence Dayana
 
Hashfunction
Hashfunction
Fraboni Ec
 
Hashfunction
Hashfunction
Luis Goldster
 
Hashfunction
Hashfunction
James Wong
 
Hashfunction
Hashfunction
Tony Nguyen
 
Hash function
Hash function
Harry Potter
 
Hashfunction
Hashfunction
David Hoen
 
Hashfunction
Hashfunction
Young Alista
 
Information and data security cryptographic hash functions
Information and data security cryptographic hash functions
Mazin Alwaaly
 
Secure Hashing Techniques - Introduction
Secure Hashing Techniques - Introduction
Udhayyagethan Mano
 
Unit 4
Unit 4
KRAMANJANEYULU1
 
Cns
Cns
ArthyR3
 
Chapter 24 Wireless Network Security Systems
Chapter 24 Wireless Network Security Systems
GoldenMIT
 
Chapter 23 Internet Authentication Applications
Chapter 23 Internet Authentication Applications
GoldenMIT
 

More Related Content

Similar to Hash Functions - Uses, Requirements, Secure Hash Algorithm (20)

Hash crypto
Hash crypto
Harry Potter
 
Hash crypto
Hash crypto
Luis Goldster
 
Hash crypto
Hash crypto
David Hoen
 
Hash crypto
Hash crypto
Tony Nguyen
 
Hash crypto
Hash crypto
James Wong
 
Hash crypto
Hash crypto
Young Alista
 
Sha
Sha
ha123
 
NSC_Unit-III_final.ppt
NSC_Unit-III_final.ppt
DrVASAVIBANDE
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functions
Dr.Florence Dayana
 
Hashfunction
Hashfunction
Fraboni Ec
 
Hashfunction
Hashfunction
Luis Goldster
 
Hashfunction
Hashfunction
James Wong
 
Hashfunction
Hashfunction
Tony Nguyen
 
Hash function
Hash function
Harry Potter
 
Hashfunction
Hashfunction
David Hoen
 
Hashfunction
Hashfunction
Young Alista
 
Information and data security cryptographic hash functions
Information and data security cryptographic hash functions
Mazin Alwaaly
 
Secure Hashing Techniques - Introduction
Secure Hashing Techniques - Introduction
Udhayyagethan Mano
 
Unit 4
Unit 4
KRAMANJANEYULU1
 
Cns
Cns
ArthyR3
 

More from GoldenMIT (6)

Chapter 24 Wireless Network Security Systems
Chapter 24 Wireless Network Security Systems
GoldenMIT
 
Chapter 23 Internet Authentication Applications
Chapter 23 Internet Authentication Applications
GoldenMIT
 
Chapter 22 Internet Security Protocols and Standards
Chapter 22 Internet Security Protocols and Standards
GoldenMIT
 
Digital Signatures RSA DSS Algorithm Explained
Digital Signatures RSA DSS Algorithm Explained
GoldenMIT
 
Information Security Incident Management.pdf
Information Security Incident Management.pdf
GoldenMIT
 
ch-10.ppt
ch-10.ppt
GoldenMIT
 
Chapter 24 Wireless Network Security Systems
Chapter 24 Wireless Network Security Systems
GoldenMIT
 
Chapter 23 Internet Authentication Applications
Chapter 23 Internet Authentication Applications
GoldenMIT
 
Chapter 22 Internet Security Protocols and Standards
Chapter 22 Internet Security Protocols and Standards
GoldenMIT
 
Digital Signatures RSA DSS Algorithm Explained
Digital Signatures RSA DSS Algorithm Explained
GoldenMIT
 
Information Security Incident Management.pdf
Information Security Incident Management.pdf
GoldenMIT
 
Ad

Recently uploaded (20)

INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
Ronisha Das
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
 
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 
Peer Teaching Observations During School Internship
Peer Teaching Observations During School Internship
AjayaMohanty7
 
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
June 2025 Progress Update With Board Call_In process.pptx
June 2025 Progress Update With Board Call_In process.pptx
International Society of Service Innovation Professionals
 
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
LDMMIA Yoga S10 Free Workshop Grad Level
LDMMIA Yoga S10 Free Workshop Grad Level
LDM & Mia eStudios
 
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
 
INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
Ronisha Das
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
 
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 
Peer Teaching Observations During School Internship
Peer Teaching Observations During School Internship
AjayaMohanty7
 
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
LDMMIA Yoga S10 Free Workshop Grad Level
LDMMIA Yoga S10 Free Workshop Grad Level
LDM & Mia eStudios
 
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
 
Ad

Hash Functions - Uses, Requirements, Secure Hash Algorithm

  • 1. Cryptographic Hash Functions Each of the messages, like each one he had ever read of Stern's commands, began with a number and ended with a number or row of numbers. No efforts on the part of Mungo or any of his experts had been able to break Stern's code, nor was there any clue as to what the preliminary number and those ultimate numbers signified. —Talking to Strange Men, Ruth Rendell
  • 2. Hash Functions ➢ condenses arbitrary message to fixed size h = H(M) ➢ usually assume hash function is public ➢ hash used to detect changes to message ➢ want a cryptographic hash function ⚫ computationally infeasible to find data mapping to specific hash (one-way property) ⚫ computationally infeasible to find two data to same hash (collision-free property)
  • 4. Hash Function Uses ➢ Message Integrity Check (MIC) ⚫ send hash of message (digest) ⚫ MIC always encrypted, message optionally ➢ Message Authentication Code (MAC) ⚫ send keyed hash of message ⚫ MAC, message optionally encrypted ➢ Digital Signature (non-repudiation) ⚫ Encrypt hash with private (signing) key ⚫ Verify with public (verification) key
  • 5. Hash Functions & Message Authentication Symmetric Key Unkeyed Hash a) Message encrypted b) Message unencrypted
  • 6. Hash Functions & Message Authentication Symmetric Key Keyed Hash a) Message unencrypted d) Message encrypted
  • 7. Hash Functions & Digital Signatures - PKCS
  • 8. More Hash Function Uses ➢ to create a one-way password file ⚫ store hash of password not actual password ⚫ e.g., Unix, Windows NT, etc. ⚫ salt to deter precomputation attacks ⚫ Rainbow tables ➢ for intrusion detection and virus detection ⚫ keep & check hash of files on system ⚫ e.g., Tripwire
  • 10. Secure Hash Algorithm ➢ SHA originally designed by NIST & NSA in 1993 ➢ was revised in 1995 as SHA-1 ➢ US standard for use with DSA signature scheme ⚫ standard is FIPS 180-1 1995, also Internet RFC3174 ⚫ nb. the algorithm is SHA, the standard is SHS ➢ based on design of MD4 with key differences ➢ produces 160-bit hash values ➢ 2005 results on security of SHA-1 raised concerns on its use in future applications
  • 11. Revised Secure Hash Standard ➢ NIST issued revision FIPS 180-2 in 2002 ➢ adds 3 additional versions of SHA ⚫ SHA-256, SHA-384, SHA-512 ➢ designed for compatibility with increased security provided by the AES cipher ➢ structure & detail is similar to SHA-1 ➢ hence analysis should be similar ➢ but security levels are rather higher
  • 14. SHA-512 Processing of a Single 1024-Bit Block
  • 15. SHA-512 Compression Function ➢ heart of the algorithm ➢ processing message in 1024-bit blocks ➢ consists of 80 rounds ⚫ updating a 512-bit buffer ⚫ using a 64-bit value Wt derived from the current message block ⚫ and a round constant based on cube root of first 80 prime numbers
  • 18. Summary ➢ have considered: ⚫ hash functions • uses, requirements, security ⚫ SHA-512