SlideShare a Scribd company logo
14
Most read
15
Most read
16
Most read
Cryptography and Cyber Security
[IT311]
Sanjivani Rural Education Society’s
Sanjivani College of Engineering, Kopargaon-423603
(An Autonomous Institute Affiliated to Savitribai Phule Pune University, Pune)
NAAC ‘A’ Grade Accredited, ISO 9001:2015 Certified
Department of Information Technology
(NBAAccredited)
Mrs. Kanchan D. Patil
Assistant Professor
Unit 3: Message Digest & Key Management
• Hash Algorithms: SHA-1, MD5, Key Management: Introduction, Key
Management: Generations, Distribution, Updation, Digital Certificate,
Digital Signature, Kerberos 5.0.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Secure Hash Algorithm (SHA)
• Secure Hash Algorithms (SHA) was developed by National Institute of
Standards and Technology (NIST) along with NSA
• Published as a Federal Information Processing Standards Publications (FIPS
180 PUBS) in 1993
• A revised version was issued as FIPS PUB 180-1 in 1995 and is referred to as
SHA-1
• SHA is a modified version of MD5
• Name of Standard: Secure Hash Signature Standard (SHS)
• In 2002 , NIST produced a revised version of the standard, FIPS 180-2 that
defined three new versions of SHA as SHA-256, SHA-384, and SHA-512.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Secure Hash Algorithm (SHA) : Purpose
• Purpose of SHA is authentication and not the encryption
• Verify that received messages come from the alleged source and have not
been altered.
• Verify the sequence and timing.
• Digital Signature is used to combat denial of receipt of a message by either
the source or destination.
• Impossible to recreate a message given a message digest.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Secure Hash Algorithm (SHA) : Applications
• SHA uses one way hash function. The applications are as follows:
• Public Key Algorithms
• Password Logins
• Encryption Key Management
• Digital Signatures
• Integrity Checking
• Virus and Malware Scanning
• Authentication
• Secure Web Connections (PGP, SSL, SSH, S/MIME)
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Secure Hash Algorithm (SHA) : Variants
• MD4 and MD5 by Ron Rivest (1990,1994)
• SHA-0, SHA-1 by NSA (1993, 1995)
• RIPEMD-160 (1996)
• SHA-2 (2002 – 224, 256, 385, 512)
• Whirlpool
• Tiger
• GOST-3411
• SHA-3
• Winner selected from solicitations in 2012
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Structure of SHA
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• SHA is closely modeled after MD5
• Step 1: Padding
• To add padding to the end of the original message in such a way that the
length of the message is 64 bits short of a multiple of 512.
• Like MD5, the padding always added, even if the message is already 64
bits short of a multiple of 512.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 2: Append length
• The length of the message excluding the length of the padding is
calculated and appended to the end of the padding as a 64-bit block.
• Step 3: Divide the input into 512-bit blocks
• The input message is now divided into blocks, of length 512 bits.
• These blocks become the input to the message digest processing logic.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 4: Initialize chaining variables
• Five chaining variables A through E
• In the case of SHA want to produce a message digest of length 160 bits,
we need to have five chaining variables here (5 x 32 = 160 bits).
• In SHA, the variables A through D have the same values as they had in
MD5
• Additionally, E is initialized to Hex C3 D2 E1 F0.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5: Process Blocks
• Step 5.1:
• Copy the chaining variables A-E into variables a-e.
• The combination of a-e, called as abede will be considered as a
single register for storing the temporary intermediate as well as the
final results.
• Step 5.2:
• Now, divide the current 512-bit block into 16 sub-blocks, each
consisting of 32 bits.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5: Process Blocks
• Step 5.3: SHA has four rounds, each round consisting of 20 steps.
• Each round takes three inputs
• Current 512- bit block
• Register abcde
• A constant K[t] (where t=0 to 79)
• It then updates the contents of the register abcde using the SHA
algorithm steps.
• We have only four constants (in case of MD5-64 constants) defined
for K[t], one used in each of the four rounds.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5: Process Blocks
• Step 5.3: We have only four constants (in case of MD5- 64 constants)
defined for K[t], one used in each of the four rounds.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5.4
• SHA consists of four rounds, each round containing 20 iterations.
• This makes it a total of 80 iterations.
• Mathematically, an iteration consists of the following operations:
abcde = (e + Process P+s^5(a)+ W[t] + K[t]), a, s^30 (b), c,d
Where,
abcde = The register made up of the five variables a, b, c, d and e
Process P = The logical operation
S^t = Circular-left shift of the 32-bit sub-block by t bits
W[t] = A 32-bit derived from the current 32-bit sub block
K[t] = One of the five additive constants
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA : Single SHA-1 Iteration
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5.4 : Process P in each SHA-1 round
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5.4
• The values of W[t] can be calculated as follows:
• For the first 16 words of W (ie. t = 0 to 15), the contents of the input
message sub-block M[t] become the contents of W[t] straightaway.
• That is, the first 16 blocks of the input message M copied to W.
• The remaining 64 values of W are derived using the equation:
W[t] = s' (W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3])
s' indicates a circular-left shift (i.e. rotation) by 1 bit position.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cryptanalysis and Limitation
• Key Premises for Hash Functions:
• Impossible to re-create a message given a fingerprint
• Collision Free
• SHA-1 failure using brute force attack in 2^80 operations
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Comparison of SHA Parameters
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Difference Between MD5 and SHA-1
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Sr.
No.
Points of Discussion MD5 SHA-1
1 Message digest length in bits 128 160
2 Attack to try and find the original
message given a message digest
Requires 2^128 operations to
break in
Requires 2^160 operations to
break in. more secure
3 Attack to try and find two
messages producing the same
message digest
Requires 2^64 operations to
break in
Requires 2^80 operations to
break in
4 Successful attacks so far Attempts reported so far No reported yet
5 Speed Faster (64 iterations and 128-
bit buffer)
Slower (80 iterations and 160-
bit buffer)
6 Software implementation Simple. Does not need any
large programs or complex
tables
Simple. Does not need any
large programs or complex
tables
References:
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
• Atul Kahate,”Cryptography and Network Security”, second edition, Tata
McGraw Hill
• William Stallings, “Cryptography and Network Security-Principles and
practice”

More Related Content

PDF
Unit 2_DES Algorithm_Encryption_Decryption.pdf
PDF
Unit 3_Hash function and MD5 working.pdf
PDF
Unit 2_AES_AES_Structure_Encryption_Example.pdf
PDF
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
PDF
Unit 1_Transposition Techniques_Ciphers.pdf
PDF
Unit 3_Digital Signature Model Details.pdf
PDF
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
PDF
Unit 2_Key distribution_Deffi-Hellman.pdf
Unit 2_DES Algorithm_Encryption_Decryption.pdf
Unit 3_Hash function and MD5 working.pdf
Unit 2_AES_AES_Structure_Encryption_Example.pdf
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
Unit 1_Transposition Techniques_Ciphers.pdf
Unit 3_Digital Signature Model Details.pdf
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
Unit 2_Key distribution_Deffi-Hellman.pdf

What's hot (20)

PDF
Unit 3_Kerberos Protocol_Working_Version.pdf
PDF
Unit 1_Classical Encryption Techniques.pdf
PDF
Unit 1_Security Fundamentals_services_mechanisms.pdf
PDF
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
PDF
Unit 6_keylogger_Spywares_virus_worms.pdf
PDF
Unit 3_Private Key Management_Protection.pdf
PDF
AES Solved Example on Encryption all rounds.pdf
PDF
Unit 5_Classification of Cyber Crimes.pdf
PDF
Unit 5_Introduction to Cyber Security.pdf
PDF
Unit 6_Introduction_Phishing_Password Cracking.pdf
PDF
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
PDF
ML_Unit_IV_Clustering in Machine Learning.pdf
PPT
Cloud presentation
PDF
Unit1_Types of MACHINE LEARNING 2020pattern.pdf
PDF
Unit1_Introduction to ML_Defination_application.pdf
PDF
AWS Services_ An In-Depth Study-documentation
PDF
Unit 6_Cyber Laws Indian Act_Digital Signature.pdf
PDF
Machine Learning_Unit_II_Regression_notes.pdf
PDF
Unit 5_Social Engineering and Cyberstalking.pdf
PDF
Unit 3_Digital Certificate_Intro_Types.pdf
Unit 3_Kerberos Protocol_Working_Version.pdf
Unit 1_Classical Encryption Techniques.pdf
Unit 1_Security Fundamentals_services_mechanisms.pdf
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
Unit 6_keylogger_Spywares_virus_worms.pdf
Unit 3_Private Key Management_Protection.pdf
AES Solved Example on Encryption all rounds.pdf
Unit 5_Classification of Cyber Crimes.pdf
Unit 5_Introduction to Cyber Security.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
ML_Unit_IV_Clustering in Machine Learning.pdf
Cloud presentation
Unit1_Types of MACHINE LEARNING 2020pattern.pdf
Unit1_Introduction to ML_Defination_application.pdf
AWS Services_ An In-Depth Study-documentation
Unit 6_Cyber Laws Indian Act_Digital Signature.pdf
Machine Learning_Unit_II_Regression_notes.pdf
Unit 5_Social Engineering and Cyberstalking.pdf
Unit 3_Digital Certificate_Intro_Types.pdf
Ad

Similar to Unit 3_Secure Hash Algorithm_SHA_Working.pdf (20)

PPT
Secure hashing algorithm
PDF
A Comparative Analysis between SHA and MD5 algorithms
PPTX
Public key cryptography and message authentication
 
PPTX
cryptography and network security cns.pptx
PDF
Keccak
PPTX
Information and data security cryptographic hash functions
PPT
Distribution of public keys and hmac
PPT
Hash Function & Analysis
PPT
ENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
PPTX
UNIT III - Cryptography Notes Asymmetric Crypto.pptx
PPT
SHA New Revised Version - SHA-512 Syllabus Module 3
PPTX
SHA- Secure hashing algorithm
PPT
Unit II.ppt.............................
PPTX
Secure Hash Algorithm
PPTX
Information and data security pseudorandom number generation and stream cipher
PPTX
Message Digest message digest ppttsx.pptx
PDF
online examination portal project presentation
PPTX
Information and network security 39 secure hash algorithm
PPTX
Cryptographic Hash Functions in Security.pptx
Secure hashing algorithm
A Comparative Analysis between SHA and MD5 algorithms
Public key cryptography and message authentication
 
cryptography and network security cns.pptx
Keccak
Information and data security cryptographic hash functions
Distribution of public keys and hmac
Hash Function & Analysis
ENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
UNIT III - Cryptography Notes Asymmetric Crypto.pptx
SHA New Revised Version - SHA-512 Syllabus Module 3
SHA- Secure hashing algorithm
Unit II.ppt.............................
Secure Hash Algorithm
Information and data security pseudorandom number generation and stream cipher
Message Digest message digest ppttsx.pptx
online examination portal project presentation
Information and network security 39 secure hash algorithm
Cryptographic Hash Functions in Security.pptx
Ad

More from KanchanPatil34 (8)

PDF
Unit 1_Data Validation_Validation Techniques.pdf
PDF
Unit 1_Concet of Feature-Feature Selection Methods.pdf
PDF
Unit 1_Introduction to ML_Types_Applications.pdf
PDF
Unit 1_Stack and Queue using Linked Organization.pdf
PDF
Unit 1_Single Linked List and Double Linked List.pdf
PDF
Unit 2_2 Binary Tree as ADT_General Tree.pdf
PDF
Unit 2_1 Tree.pdf
PDF
Unit 2_3 Binary Tree Traversals.pdf
Unit 1_Data Validation_Validation Techniques.pdf
Unit 1_Concet of Feature-Feature Selection Methods.pdf
Unit 1_Introduction to ML_Types_Applications.pdf
Unit 1_Stack and Queue using Linked Organization.pdf
Unit 1_Single Linked List and Double Linked List.pdf
Unit 2_2 Binary Tree as ADT_General Tree.pdf
Unit 2_1 Tree.pdf
Unit 2_3 Binary Tree Traversals.pdf

Recently uploaded (20)

PDF
VCE English Exam - Section C Student Revision Booklet
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Pharma ospi slides which help in ospi learning
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Cell Structure & Organelles in detailed.
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Classroom Observation Tools for Teachers
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
VCE English Exam - Section C Student Revision Booklet
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Microbial disease of the cardiovascular and lymphatic systems
O5-L3 Freight Transport Ops (International) V1.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Pharma ospi slides which help in ospi learning
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Microbial diseases, their pathogenesis and prophylaxis
Cell Structure & Organelles in detailed.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
FourierSeries-QuestionsWithAnswers(Part-A).pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Classroom Observation Tools for Teachers
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...

Unit 3_Secure Hash Algorithm_SHA_Working.pdf

  • 1. Cryptography and Cyber Security [IT311] Sanjivani Rural Education Society’s Sanjivani College of Engineering, Kopargaon-423603 (An Autonomous Institute Affiliated to Savitribai Phule Pune University, Pune) NAAC ‘A’ Grade Accredited, ISO 9001:2015 Certified Department of Information Technology (NBAAccredited) Mrs. Kanchan D. Patil Assistant Professor
  • 2. Unit 3: Message Digest & Key Management • Hash Algorithms: SHA-1, MD5, Key Management: Introduction, Key Management: Generations, Distribution, Updation, Digital Certificate, Digital Signature, Kerberos 5.0. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 3. Secure Hash Algorithm (SHA) • Secure Hash Algorithms (SHA) was developed by National Institute of Standards and Technology (NIST) along with NSA • Published as a Federal Information Processing Standards Publications (FIPS 180 PUBS) in 1993 • A revised version was issued as FIPS PUB 180-1 in 1995 and is referred to as SHA-1 • SHA is a modified version of MD5 • Name of Standard: Secure Hash Signature Standard (SHS) • In 2002 , NIST produced a revised version of the standard, FIPS 180-2 that defined three new versions of SHA as SHA-256, SHA-384, and SHA-512. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 4. Secure Hash Algorithm (SHA) : Purpose • Purpose of SHA is authentication and not the encryption • Verify that received messages come from the alleged source and have not been altered. • Verify the sequence and timing. • Digital Signature is used to combat denial of receipt of a message by either the source or destination. • Impossible to recreate a message given a message digest. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 5. Secure Hash Algorithm (SHA) : Applications • SHA uses one way hash function. The applications are as follows: • Public Key Algorithms • Password Logins • Encryption Key Management • Digital Signatures • Integrity Checking • Virus and Malware Scanning • Authentication • Secure Web Connections (PGP, SSL, SSH, S/MIME) Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 6. Secure Hash Algorithm (SHA) : Variants • MD4 and MD5 by Ron Rivest (1990,1994) • SHA-0, SHA-1 by NSA (1993, 1995) • RIPEMD-160 (1996) • SHA-2 (2002 – 224, 256, 385, 512) • Whirlpool • Tiger • GOST-3411 • SHA-3 • Winner selected from solicitations in 2012 Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 7. Structure of SHA Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 8. Working of SHA • SHA is closely modeled after MD5 • Step 1: Padding • To add padding to the end of the original message in such a way that the length of the message is 64 bits short of a multiple of 512. • Like MD5, the padding always added, even if the message is already 64 bits short of a multiple of 512. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 9. Working of SHA • Step 2: Append length • The length of the message excluding the length of the padding is calculated and appended to the end of the padding as a 64-bit block. • Step 3: Divide the input into 512-bit blocks • The input message is now divided into blocks, of length 512 bits. • These blocks become the input to the message digest processing logic. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 10. Working of SHA • Step 4: Initialize chaining variables • Five chaining variables A through E • In the case of SHA want to produce a message digest of length 160 bits, we need to have five chaining variables here (5 x 32 = 160 bits). • In SHA, the variables A through D have the same values as they had in MD5 • Additionally, E is initialized to Hex C3 D2 E1 F0. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 11. Working of SHA • Step 5: Process Blocks • Step 5.1: • Copy the chaining variables A-E into variables a-e. • The combination of a-e, called as abede will be considered as a single register for storing the temporary intermediate as well as the final results. • Step 5.2: • Now, divide the current 512-bit block into 16 sub-blocks, each consisting of 32 bits. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 12. Working of SHA • Step 5: Process Blocks • Step 5.3: SHA has four rounds, each round consisting of 20 steps. • Each round takes three inputs • Current 512- bit block • Register abcde • A constant K[t] (where t=0 to 79) • It then updates the contents of the register abcde using the SHA algorithm steps. • We have only four constants (in case of MD5-64 constants) defined for K[t], one used in each of the four rounds. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 13. Working of SHA • Step 5: Process Blocks • Step 5.3: We have only four constants (in case of MD5- 64 constants) defined for K[t], one used in each of the four rounds. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 14. Working of SHA • Step 5.4 • SHA consists of four rounds, each round containing 20 iterations. • This makes it a total of 80 iterations. • Mathematically, an iteration consists of the following operations: abcde = (e + Process P+s^5(a)+ W[t] + K[t]), a, s^30 (b), c,d Where, abcde = The register made up of the five variables a, b, c, d and e Process P = The logical operation S^t = Circular-left shift of the 32-bit sub-block by t bits W[t] = A 32-bit derived from the current 32-bit sub block K[t] = One of the five additive constants Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 15. Working of SHA : Single SHA-1 Iteration Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 16. Working of SHA • Step 5.4 : Process P in each SHA-1 round Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 17. Working of SHA • Step 5.4 • The values of W[t] can be calculated as follows: • For the first 16 words of W (ie. t = 0 to 15), the contents of the input message sub-block M[t] become the contents of W[t] straightaway. • That is, the first 16 blocks of the input message M copied to W. • The remaining 64 values of W are derived using the equation: W[t] = s' (W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3]) s' indicates a circular-left shift (i.e. rotation) by 1 bit position. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 18. Cryptanalysis and Limitation • Key Premises for Hash Functions: • Impossible to re-create a message given a fingerprint • Collision Free • SHA-1 failure using brute force attack in 2^80 operations Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 19. Comparison of SHA Parameters Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 20. Difference Between MD5 and SHA-1 Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology Sr. No. Points of Discussion MD5 SHA-1 1 Message digest length in bits 128 160 2 Attack to try and find the original message given a message digest Requires 2^128 operations to break in Requires 2^160 operations to break in. more secure 3 Attack to try and find two messages producing the same message digest Requires 2^64 operations to break in Requires 2^80 operations to break in 4 Successful attacks so far Attempts reported so far No reported yet 5 Speed Faster (64 iterations and 128- bit buffer) Slower (80 iterations and 160- bit buffer) 6 Software implementation Simple. Does not need any large programs or complex tables Simple. Does not need any large programs or complex tables
  • 21. References: Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology • Atul Kahate,”Cryptography and Network Security”, second edition, Tata McGraw Hill • William Stallings, “Cryptography and Network Security-Principles and practice”