SlideShare a Scribd company logo
Information and Network Security:40
SHA 3 Secure Hash Algorithm
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
SHA-3
• SHA-1 not yet "broken”
• but similar to broken MD5 & SHA-0
• so considered insecure
• SHA-2 (esp. SHA-512) seems secure
• shares same structure and mathematical operations as
predecessors so have concern
• NIST announced in 2007 a competition for the SHA-3
next gen NIST hash function
• goal to have in place by 2012 but not fixed
SHA-3
• As yet, SHA-1 has not yet been "broken".
• That is, no one has demonstrated a technique for producing collisions
in less than brute-force time.
• However, because SHA-1 is very similar in structure and in the basic
mathematical operations used to MD5 and SHA-0, both of which have
been broken, SHA-1 is considered insecure and has been phased out
for SHA-2.
SHA-3
• SHA-2, particularly the 512-bit version, would appear to provide
unassailable security.
• However, SHA-2 shares the same structure and mathematical
operations as its predecessors, and this is a cause for concern.
• Because it will take years to find a suitable replacement for SHA-2,
should it become vulnerable, NIST decided to begin the process of
developing a new hash standard.
SHA-3
• Accordingly, NIST announced in 2007 a competition to produce the
next generation NIST hash function, to be called SHA-3.
• NIST would like to have a new standard in place by the end of 2012,
but emphasizes that this is not a fixed timeline.
SHA-3 Requirements
replace SHA-2 with SHA-3 in any use
so use same hash sizes
preserve the online nature of SHA-2
so must process small blocks (512 / 1024 bits)
evaluation criteria
security close to theoretical max for hash sizes
cost in time & memory
characteristics: such as flexibility & simplicity
SHA-3 Requirements
• The basic requirements that must be satisfied by any candidate for
SHA-3 are:
• It must be possible to replace SHA-2 with SHA-3 in any application by
a simple drop-in substitution. Therefore, SHA-3 must support hash
value lengths of 224, 256, 384, and 512 bits.
• SHA-3 must preserve the online nature of SHA-2. That is, the
algorithm must process comparatively small blocks (512 or 1024 bits)
at a time instead of requiring that the entire message be buffered in
memory before
SHA-3 Requirements
• Beyond these basic requirements, NIST has defined a set of
evaluation criteria. These criteria are designed to reflect the
requirements for the main applications supported by SHA-2, and are:
• • Security: The strength of SHA-3 should be close to the theoretical
maximum for the different required hash sizes, and for both preimage
resistance and collision resistance. SHA-3 algorithms must be
designed to resist any potentially successful attack on SHA-2 functions
SHA-3 Requirements
• • Cost: be both time and memory efficient over a range of hardware
platforms.
• • Algorithm and implementation characteristics: such as flexibility
(e.g., tunable parameters for security/performance tradeoffs,
opportunity for parallelization, and so on), and simplicity (which
makes it easier to analyze the security properties of the algorithm)
Assignment
• What is SHA 3 Secure Hash Algorithm
• Discuss the requirements of SHA 3
Ad

Recommended

A Survey of Password Attacks and Safe Hashing Algorithms
A Survey of Password Attacks and Safe Hashing Algorithms
IRJET Journal
 
ch12.ppt
ch12.ppt
SomuPatil8
 
HMAC&CMAC.ppt
HMAC&CMAC.ppt
DrVASAVIBANDE
 
The SHA Hashing Algorithm
The SHA Hashing Algorithm
Bob Landstrom
 
Information and data security cryptographic hash functions
Information and data security cryptographic hash functions
Mazin Alwaaly
 
Ijarcet vol-2-issue-7-2268-2272
Ijarcet vol-2-issue-7-2268-2272
Editor IJARCET
 
Ijarcet vol-2-issue-7-2268-2272
Ijarcet vol-2-issue-7-2268-2272
Editor IJARCET
 
Whitepaper on new research on message digest and hash techniques
Whitepaper on new research on message digest and hash techniques
Bhargav Amin
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
SHA-3
SHA-3
rokham khawaja
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Hashing
Hashing
yashwantsingh122
 
multiple encryption in clouud computing
multiple encryption in clouud computing
Rauf Wani
 
Module (Blockchain & Cryptocurrency).pptx
Module (Blockchain & Cryptocurrency).pptx
BaharAli53
 
SHA-1 Collision Found - eSCan
SHA-1 Collision Found - eSCan
MicroWorld Software Services Pvt Ltd
 
Encryption in php
Encryption in php
sana mateen
 
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
ijcisjournal
 
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
ijcisjournal
 
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
ijcisjournal
 
Hybrid Approach for generating Binary Secured Face templates with BDA
Hybrid Approach for generating Binary Secured Face templates with BDA
Self
 
Hash_Crypto.ppt
Hash_Crypto.ppt
ssuser5297f5
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
GnanalakshmiV
 
Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!
Stefan Oehrli
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Entrust Datacard
 
A review towards various hash algorithms and their comparative analysis
A review towards various hash algorithms and their comparative analysis
IRJET Journal
 
cryptography and network security cns.pptx
cryptography and network security cns.pptx
gkumar610
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
Napier University
 
Network Security Unit-2 topic Part-2.pptx
Network Security Unit-2 topic Part-2.pptx
harshalipics
 
Information and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 

More Related Content

Similar to Information and network security 40 sha3 secure hash algorithm (20)

Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
SHA-3
SHA-3
rokham khawaja
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Hashing
Hashing
yashwantsingh122
 
multiple encryption in clouud computing
multiple encryption in clouud computing
Rauf Wani
 
Module (Blockchain & Cryptocurrency).pptx
Module (Blockchain & Cryptocurrency).pptx
BaharAli53
 
SHA-1 Collision Found - eSCan
SHA-1 Collision Found - eSCan
MicroWorld Software Services Pvt Ltd
 
Encryption in php
Encryption in php
sana mateen
 
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
ijcisjournal
 
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
ijcisjournal
 
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
ijcisjournal
 
Hybrid Approach for generating Binary Secured Face templates with BDA
Hybrid Approach for generating Binary Secured Face templates with BDA
Self
 
Hash_Crypto.ppt
Hash_Crypto.ppt
ssuser5297f5
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
GnanalakshmiV
 
Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!
Stefan Oehrli
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Entrust Datacard
 
A review towards various hash algorithms and their comparative analysis
A review towards various hash algorithms and their comparative analysis
IRJET Journal
 
cryptography and network security cns.pptx
cryptography and network security cns.pptx
gkumar610
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
Napier University
 
Network Security Unit-2 topic Part-2.pptx
Network Security Unit-2 topic Part-2.pptx
harshalipics
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
multiple encryption in clouud computing
multiple encryption in clouud computing
Rauf Wani
 
Module (Blockchain & Cryptocurrency).pptx
Module (Blockchain & Cryptocurrency).pptx
BaharAli53
 
Encryption in php
Encryption in php
sana mateen
 
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
ijcisjournal
 
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
ijcisjournal
 
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
ijcisjournal
 
Hybrid Approach for generating Binary Secured Face templates with BDA
Hybrid Approach for generating Binary Secured Face templates with BDA
Self
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
GnanalakshmiV
 
Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!
Stefan Oehrli
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Entrust Datacard
 
A review towards various hash algorithms and their comparative analysis
A review towards various hash algorithms and their comparative analysis
IRJET Journal
 
cryptography and network security cns.pptx
cryptography and network security cns.pptx
gkumar610
 
Network Security Unit-2 topic Part-2.pptx
Network Security Unit-2 topic Part-2.pptx
harshalipics
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 
Information and network security 26 aes decryption and implementational issues
Information and network security 26 aes decryption and implementational issues
Vaibhav Khanna
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aes
Vaibhav Khanna
 
Information and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aes
Vaibhav Khanna
 
Information and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 
Information and network security 26 aes decryption and implementational issues
Information and network security 26 aes decryption and implementational issues
Vaibhav Khanna
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aes
Vaibhav Khanna
 
Information and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aes
Vaibhav Khanna
 
Ad

Recently uploaded (20)

Download Adobe Illustrator Crack free for Windows 2025?
Download Adobe Illustrator Crack free for Windows 2025?
grete1122g
 
wAIred_RabobankIgniteSession_12062025.pptx
wAIred_RabobankIgniteSession_12062025.pptx
SimonedeGijt
 
What is data visualization and how data visualization tool can help.pdf
What is data visualization and how data visualization tool can help.pdf
Varsha Nayak
 
Shell Skill Tree - LabEx Certification (LabEx)
Shell Skill Tree - LabEx Certification (LabEx)
VICTOR MAESTRE RAMIREZ
 
Code and No-Code Journeys: The Coverage Overlook
Code and No-Code Journeys: The Coverage Overlook
Applitools
 
Zoneranker’s Digital marketing solutions
Zoneranker’s Digital marketing solutions
reenashriee
 
Who will create the languages of the future?
Who will create the languages of the future?
Jordi Cabot
 
UPDASP a project coordination unit ......
UPDASP a project coordination unit ......
withrj1
 
Integrating Survey123 and R&H Data Using FME
Integrating Survey123 and R&H Data Using FME
Safe Software
 
Looking for a BIRT Report Alternative Here’s Why Helical Insight Stands Out.pdf
Looking for a BIRT Report Alternative Here’s Why Helical Insight Stands Out.pdf
Varsha Nayak
 
Smadav Pro 2025 Rev 15.4 Crack Full Version With Registration Key
Smadav Pro 2025 Rev 15.4 Crack Full Version With Registration Key
joybepari360
 
How to Choose the Right Web Development Agency.pdf
How to Choose the Right Web Development Agency.pdf
Creative Fosters
 
dp-700 exam questions sample docume .pdf
dp-700 exam questions sample docume .pdf
pravkumarbiz
 
On-Device AI: Is It Time to Go All-In, or Do We Still Need the Cloud?
On-Device AI: Is It Time to Go All-In, or Do We Still Need the Cloud?
Hassan Abid
 
Transmission Media. (Computer Networks)
Transmission Media. (Computer Networks)
S Pranav (Deepu)
 
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Puppy jhon
 
Software Testing & it’s types (DevOps)
Software Testing & it’s types (DevOps)
S Pranav (Deepu)
 
Women in Tech: Marketo Engage User Group - June 2025 - AJO with AWS
Women in Tech: Marketo Engage User Group - June 2025 - AJO with AWS
BradBedford3
 
Meet You in the Middle: 1000x Performance for Parquet Queries on PB-Scale Dat...
Meet You in the Middle: 1000x Performance for Parquet Queries on PB-Scale Dat...
Alluxio, Inc.
 
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Philip Schwarz
 
Download Adobe Illustrator Crack free for Windows 2025?
Download Adobe Illustrator Crack free for Windows 2025?
grete1122g
 
wAIred_RabobankIgniteSession_12062025.pptx
wAIred_RabobankIgniteSession_12062025.pptx
SimonedeGijt
 
What is data visualization and how data visualization tool can help.pdf
What is data visualization and how data visualization tool can help.pdf
Varsha Nayak
 
Shell Skill Tree - LabEx Certification (LabEx)
Shell Skill Tree - LabEx Certification (LabEx)
VICTOR MAESTRE RAMIREZ
 
Code and No-Code Journeys: The Coverage Overlook
Code and No-Code Journeys: The Coverage Overlook
Applitools
 
Zoneranker’s Digital marketing solutions
Zoneranker’s Digital marketing solutions
reenashriee
 
Who will create the languages of the future?
Who will create the languages of the future?
Jordi Cabot
 
UPDASP a project coordination unit ......
UPDASP a project coordination unit ......
withrj1
 
Integrating Survey123 and R&H Data Using FME
Integrating Survey123 and R&H Data Using FME
Safe Software
 
Looking for a BIRT Report Alternative Here’s Why Helical Insight Stands Out.pdf
Looking for a BIRT Report Alternative Here’s Why Helical Insight Stands Out.pdf
Varsha Nayak
 
Smadav Pro 2025 Rev 15.4 Crack Full Version With Registration Key
Smadav Pro 2025 Rev 15.4 Crack Full Version With Registration Key
joybepari360
 
How to Choose the Right Web Development Agency.pdf
How to Choose the Right Web Development Agency.pdf
Creative Fosters
 
dp-700 exam questions sample docume .pdf
dp-700 exam questions sample docume .pdf
pravkumarbiz
 
On-Device AI: Is It Time to Go All-In, or Do We Still Need the Cloud?
On-Device AI: Is It Time to Go All-In, or Do We Still Need the Cloud?
Hassan Abid
 
Transmission Media. (Computer Networks)
Transmission Media. (Computer Networks)
S Pranav (Deepu)
 
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Puppy jhon
 
Software Testing & it’s types (DevOps)
Software Testing & it’s types (DevOps)
S Pranav (Deepu)
 
Women in Tech: Marketo Engage User Group - June 2025 - AJO with AWS
Women in Tech: Marketo Engage User Group - June 2025 - AJO with AWS
BradBedford3
 
Meet You in the Middle: 1000x Performance for Parquet Queries on PB-Scale Dat...
Meet You in the Middle: 1000x Performance for Parquet Queries on PB-Scale Dat...
Alluxio, Inc.
 
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Philip Schwarz
 
Ad

Information and network security 40 sha3 secure hash algorithm

  • 1. Information and Network Security:40 SHA 3 Secure Hash Algorithm Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. SHA-3 • SHA-1 not yet "broken” • but similar to broken MD5 & SHA-0 • so considered insecure • SHA-2 (esp. SHA-512) seems secure • shares same structure and mathematical operations as predecessors so have concern • NIST announced in 2007 a competition for the SHA-3 next gen NIST hash function • goal to have in place by 2012 but not fixed
  • 3. SHA-3 • As yet, SHA-1 has not yet been "broken". • That is, no one has demonstrated a technique for producing collisions in less than brute-force time. • However, because SHA-1 is very similar in structure and in the basic mathematical operations used to MD5 and SHA-0, both of which have been broken, SHA-1 is considered insecure and has been phased out for SHA-2.
  • 4. SHA-3 • SHA-2, particularly the 512-bit version, would appear to provide unassailable security. • However, SHA-2 shares the same structure and mathematical operations as its predecessors, and this is a cause for concern. • Because it will take years to find a suitable replacement for SHA-2, should it become vulnerable, NIST decided to begin the process of developing a new hash standard.
  • 5. SHA-3 • Accordingly, NIST announced in 2007 a competition to produce the next generation NIST hash function, to be called SHA-3. • NIST would like to have a new standard in place by the end of 2012, but emphasizes that this is not a fixed timeline.
  • 6. SHA-3 Requirements replace SHA-2 with SHA-3 in any use so use same hash sizes preserve the online nature of SHA-2 so must process small blocks (512 / 1024 bits) evaluation criteria security close to theoretical max for hash sizes cost in time & memory characteristics: such as flexibility & simplicity
  • 7. SHA-3 Requirements • The basic requirements that must be satisfied by any candidate for SHA-3 are: • It must be possible to replace SHA-2 with SHA-3 in any application by a simple drop-in substitution. Therefore, SHA-3 must support hash value lengths of 224, 256, 384, and 512 bits. • SHA-3 must preserve the online nature of SHA-2. That is, the algorithm must process comparatively small blocks (512 or 1024 bits) at a time instead of requiring that the entire message be buffered in memory before
  • 8. SHA-3 Requirements • Beyond these basic requirements, NIST has defined a set of evaluation criteria. These criteria are designed to reflect the requirements for the main applications supported by SHA-2, and are: • • Security: The strength of SHA-3 should be close to the theoretical maximum for the different required hash sizes, and for both preimage resistance and collision resistance. SHA-3 algorithms must be designed to resist any potentially successful attack on SHA-2 functions
  • 9. SHA-3 Requirements • • Cost: be both time and memory efficient over a range of hardware platforms. • • Algorithm and implementation characteristics: such as flexibility (e.g., tunable parameters for security/performance tradeoffs, opportunity for parallelization, and so on), and simplicity (which makes it easier to analyze the security properties of the algorithm)
  • 10. Assignment • What is SHA 3 Secure Hash Algorithm • Discuss the requirements of SHA 3