SlideShare a Scribd company logo
4
Most read
5
Most read
6
Most read
Internet Network Security
Created by:
Ruchi Maurya
Secure Hashing Algorithm
(SHA)
Introduction
Sha-1
How SHA-1 works
Comparison
Application
References
 Developed by NIST along with NSA
 In 1993, SHA was published as a Federal
Information Processing Standard
 It has following versions-
 SHA-0
 SHA-1
 SHA-224
 SHA-256
 SHA-512
introduction
 It works for any input message that is less than
264 bits.
 The output of SHA is a message digest of 160 bits
in length.
 This is designed to be computationally infeasible
to:
 Obtain the original message , given its
message digest.
 Find two messages producing the same
message digest
SHA-1
How SHA-1 works.?
 Step 1: Padding of Bits
 Step 2: Append Length
 Step 3: Divide the input into 512-bit blocks
How SHA-1 works.?
 Step 4: Initialize chaining variables
 Step 5: Process Blocks- Now the actual algorithm
begins….
Chaining Variables Hex values
A 01 23 45 67
B 89 AB CD EF
C FE DC BA 98
D 76 54 32 10
E C3 D2 E1 F0
How SHA-1 works.?
 Step 5.1 : Copy chaining variables A-E into variables
a-e.
 Step 5.2 : Divide current 512-bit block into 16 sub-
blocks of 32-bits.
 Step 5.3 : SHA has 4 rounds, each consisting of 20
steps. Each round takes 3 inputs-
 512-bit block,
 The register abcde
 A constant K[t] (where t= 0 to 79)
How SHA-1 works.?
 Step 5.4 : SHA has a total of 80 iterations (4 rounds X 20 -
iterations). Each iteration consists of following operations:-
abcde = ( e +Process P + S5(a) + W[t] + K[t] ), a, S30(b) , c , d
Where,
abcde = The register made up of 5 variables a, b, c, d, e.
Process P = The logic operation.
St = Circular-left shift of 32-bit sub-block by t bits.
W[t[ = A 32-bit derived from the current 32-bit sub-block.
K[t] = One of the five additive constants.
How SHA-1 works.?
 Process P in each SHA round
Round Process P
1 (b AND c) OR (( NOT b) AND (d))
2 b XOR c XOR d
3 (b AND c ) OR (b AND d) OR (c AND d)
4 b XOR c XOR d
How SHA-1 works.?
Single SHA-1 iteration
How SHA-1 works.?
 The values of W[t] are calculated as follows :
 For the first 16 words of W (i.e. t=0 to 15) , the
contents of the input message sub-block M[t] become
the contents of W[t].
 For the remaining 64 values of W are derived using the
equation
W[t] = s1 ( W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3])
Comparison
Application
 Secure password hashing
 Secure Socket Layer (SSL) security protocol
 Digital signature
 https://brilliant.org/wiki/secure-hashing-
algorithms/
 https://www.tutorialspoint.com/cryptography/c
ryptography_hash_functions.htm
 https://www.asd.gov.au/publications/protect/S
HA-1_Deprecated.pdf
References
Thank You !!
Ad

Recommended

Message digest 5
Message digest 5
Tirthika Bandi
 
Secure Hash Algorithm
Secure Hash Algorithm
Vishakha Agarwal
 
SHA 1 Algorithm
SHA 1 Algorithm
Shiva RamDam
 
Introduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
DC - Unit - 6 - Mathematical Preliminaries for Lossy Coding
DC - Unit - 6 - Mathematical Preliminaries for Lossy Coding
Gyanmanjari Institute Of Technology
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
DUET
 
Different types of research ppt
Different types of research ppt
SWATHY M.A
 
Networking devices
Networking devices
Mubassir Ambekar
 
Hash Function
Hash Function
ssuserdfb2da
 
Hash function
Hash function
Salman Memon
 
S/MIME
S/MIME
maria azam
 
Hash Function
Hash Function
Siddharth Srivastava
 
Pgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
block ciphers
block ciphers
Asad Ali
 
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Web Security
Web Security
Dr.Florence Dayana
 
Message authentication
Message authentication
CAS
 
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
RC4&RC5
RC4&RC5
Mohamed El-Serngawy
 
2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
MD5 ALGORITHM.pptx
MD5 ALGORITHM.pptx
Rajapriya82
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
Transposition Cipher
Transposition Cipher
daniyalqureshi712
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
SHA
SHA
SubashiniRathinavel
 
crypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.ppt
shuchiagarwal12
 

More Related Content

What's hot (20)

Hash Function
Hash Function
ssuserdfb2da
 
Hash function
Hash function
Salman Memon
 
S/MIME
S/MIME
maria azam
 
Hash Function
Hash Function
Siddharth Srivastava
 
Pgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
block ciphers
block ciphers
Asad Ali
 
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Web Security
Web Security
Dr.Florence Dayana
 
Message authentication
Message authentication
CAS
 
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
RC4&RC5
RC4&RC5
Mohamed El-Serngawy
 
2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
MD5 ALGORITHM.pptx
MD5 ALGORITHM.pptx
Rajapriya82
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
Transposition Cipher
Transposition Cipher
daniyalqureshi712
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
Pgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
block ciphers
block ciphers
Asad Ali
 
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Message authentication
Message authentication
CAS
 
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
MD5 ALGORITHM.pptx
MD5 ALGORITHM.pptx
Rajapriya82
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 

Similar to SHA- Secure hashing algorithm (20)

SHA
SHA
SubashiniRathinavel
 
crypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.ppt
shuchiagarwal12
 
Secure hashing algorithm
Secure hashing algorithm
Karteek Paruchuri
 
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
KanchanPatil34
 
Sha
Sha
ha123
 
IRJET- Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2...
IRJET- Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2...
IRJET Journal
 
SHA 1 Algorithm.ppt
SHA 1 Algorithm.ppt
Rajapriya82
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Bitcoin Addresses
Bitcoin Addresses
ashmoran
 
AES.pptx
AES.pptx
RizwanBasha12
 
Data streaming algorithms
Data streaming algorithms
Hridyesh Bisht
 
Basic explanation to md5 implementation in C
Basic explanation to md5 implementation in C
Sourav Punoriyar
 
Hash mac algorithms
Hash mac algorithms
Young Alista
 
Hash mac algorithms
Hash mac algorithms
Tony Nguyen
 
Hash mac algorithms
Hash mac algorithms
David Hoen
 
Hash mac algorithms
Hash mac algorithms
Fraboni Ec
 
Hash& mac algorithms
Hash& mac algorithms
Harry Potter
 
Hash mac algorithms
Hash mac algorithms
Luis Goldster
 
Hash mac algorithms
Hash mac algorithms
James Wong
 
Module 2onblockchain technologies 2.pptx
Module 2onblockchain technologies 2.pptx
shruthig40
 
crypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.ppt
shuchiagarwal12
 
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
KanchanPatil34
 
IRJET- Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2...
IRJET- Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2...
IRJET Journal
 
SHA 1 Algorithm.ppt
SHA 1 Algorithm.ppt
Rajapriya82
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Bitcoin Addresses
Bitcoin Addresses
ashmoran
 
Data streaming algorithms
Data streaming algorithms
Hridyesh Bisht
 
Basic explanation to md5 implementation in C
Basic explanation to md5 implementation in C
Sourav Punoriyar
 
Hash mac algorithms
Hash mac algorithms
Young Alista
 
Hash mac algorithms
Hash mac algorithms
Tony Nguyen
 
Hash mac algorithms
Hash mac algorithms
David Hoen
 
Hash mac algorithms
Hash mac algorithms
Fraboni Ec
 
Hash& mac algorithms
Hash& mac algorithms
Harry Potter
 
Hash mac algorithms
Hash mac algorithms
James Wong
 
Module 2onblockchain technologies 2.pptx
Module 2onblockchain technologies 2.pptx
shruthig40
 
Ad

More from Ruchi Maurya (7)

Computer graphics - bresenham line drawing algorithm
Computer graphics - bresenham line drawing algorithm
Ruchi Maurya
 
Java- Datagram Socket class & Datagram Packet class
Java- Datagram Socket class & Datagram Packet class
Ruchi Maurya
 
Nams- Roots of equations by numerical methods
Nams- Roots of equations by numerical methods
Ruchi Maurya
 
Types of Addressing modes- COA
Types of Addressing modes- COA
Ruchi Maurya
 
Social networking
Social networking
Ruchi Maurya
 
Random access memory
Random access memory
Ruchi Maurya
 
open system interconnection
open system interconnection
Ruchi Maurya
 
Computer graphics - bresenham line drawing algorithm
Computer graphics - bresenham line drawing algorithm
Ruchi Maurya
 
Java- Datagram Socket class & Datagram Packet class
Java- Datagram Socket class & Datagram Packet class
Ruchi Maurya
 
Nams- Roots of equations by numerical methods
Nams- Roots of equations by numerical methods
Ruchi Maurya
 
Types of Addressing modes- COA
Types of Addressing modes- COA
Ruchi Maurya
 
Random access memory
Random access memory
Ruchi Maurya
 
open system interconnection
open system interconnection
Ruchi Maurya
 
Ad

Recently uploaded (20)

Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
retina_biometrics ruet rajshahi bangdesh.pptx
retina_biometrics ruet rajshahi bangdesh.pptx
MdRakibulIslam697135
 
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Shabista Imam
 
How to Un-Obsolete Your Legacy Keypad Design
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
 
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
resming1
 
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
resming1
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
Introduction to Python Programming Language
Introduction to Python Programming Language
merlinjohnsy
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
Cadastral Maps
Cadastral Maps
Google
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 
Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
retina_biometrics ruet rajshahi bangdesh.pptx
retina_biometrics ruet rajshahi bangdesh.pptx
MdRakibulIslam697135
 
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Shabista Imam
 
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
resming1
 
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
resming1
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
Introduction to Python Programming Language
Introduction to Python Programming Language
merlinjohnsy
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
Cadastral Maps
Cadastral Maps
Google
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 

SHA- Secure hashing algorithm