Os Presentation - Password and File Security
Os Presentation - Password and File Security
OPERATING SYSTEMS
CONTENTS
● Introduction
● What is Encryption?
● Why use Encryption?
● Where is Encryption used?
● Which methods UNIX and LINUX use for
Encryption of password and data?
CONTENTS
● What is MD5?
● What is SHA?
● Comparison of all algorithms
INTRODUCTION
● Used for:
– Military data security
– Government file security
– Protecting files and data on storage like USBs
– Protecting data in transit
ENCRYPTION IN UNIX AND LINUX
ID Method
1 MD5
2a Blowfish
5 SHA-256
6 SHA-512
CRYPTOGRAPHY
1. SHA-0:
Published in 1993 under the name "SHA".
Was withdrawn shortly after publication due to an
undisclosed "significant flaw" and replaced by the slightly
revised version SHA-1.
2. SHA-1:
Resembles the older MD5 algorithm.
Designed by the National Security Agency (NSA) to be
part of the Digital Signature Algorithm.
Standard is no longer approved for most cryptographic
uses after 2010.
TYPES OF SHA
3. SHA-2:
1.A family of two similar hash functions, with different block
sizes, known as SHA-256 and SHA-512. These were
also designed by the NSA.
1.4. SHA-3:
1.Formerly called Keccak
2.Chosen in 2012 after a public competition among non-
NSA designers.
3.Supports the same hash lengths as SHA-2
4.Internal structure differs significantly from the rest of the
SHA family.
WHY 3 VERSIONS OF SHA?
• For any cryptographic solution, SHA must evolve
along with our computers' calculation capacities
• If not, an SHA encryption will be faster to crack on a
faster processor
• SHA versions get out-dated & are discarded when
enough of vulnerabilities or collisions are found in
them
SHA - 256
• One of the successor hash functions to SHA-1
• Member of the SHA-2 family
• One of the strongest hash functions available
• 512-bit message block and a 256-bit intermediate
hash value
• Gives an output of 256 bits
WORKING OF SHA 256
SHA - 512
• Also a member of the SHA-2 family
• 1024-bit message block and a 512-bit intermediate
hash value
• Gives an output of 512 bits
• Much faster than SHA - 256
SHA EXAMPLE