SlideShare a Scribd company logo
4
Most read
5
Most read
6
Most read
Internet Network Security
Created by:
Ruchi Maurya
Secure Hashing Algorithm
(SHA)
Introduction
Sha-1
How SHA-1 works
Comparison
Application
References
 Developed by NIST along with NSA
 In 1993, SHA was published as a Federal
Information Processing Standard
 It has following versions-
 SHA-0
 SHA-1
 SHA-224
 SHA-256
 SHA-512
introduction
 It works for any input message that is less than
264 bits.
 The output of SHA is a message digest of 160 bits
in length.
 This is designed to be computationally infeasible
to:
 Obtain the original message , given its
message digest.
 Find two messages producing the same
message digest
SHA-1
How SHA-1 works.?
 Step 1: Padding of Bits
 Step 2: Append Length
 Step 3: Divide the input into 512-bit blocks
How SHA-1 works.?
 Step 4: Initialize chaining variables
 Step 5: Process Blocks- Now the actual algorithm
begins….
Chaining Variables Hex values
A 01 23 45 67
B 89 AB CD EF
C FE DC BA 98
D 76 54 32 10
E C3 D2 E1 F0
How SHA-1 works.?
 Step 5.1 : Copy chaining variables A-E into variables
a-e.
 Step 5.2 : Divide current 512-bit block into 16 sub-
blocks of 32-bits.
 Step 5.3 : SHA has 4 rounds, each consisting of 20
steps. Each round takes 3 inputs-
 512-bit block,
 The register abcde
 A constant K[t] (where t= 0 to 79)
How SHA-1 works.?
 Step 5.4 : SHA has a total of 80 iterations (4 rounds X 20 -
iterations). Each iteration consists of following operations:-
abcde = ( e +Process P + S5(a) + W[t] + K[t] ), a, S30(b) , c , d
Where,
abcde = The register made up of 5 variables a, b, c, d, e.
Process P = The logic operation.
St = Circular-left shift of 32-bit sub-block by t bits.
W[t[ = A 32-bit derived from the current 32-bit sub-block.
K[t] = One of the five additive constants.
How SHA-1 works.?
 Process P in each SHA round
Round Process P
1 (b AND c) OR (( NOT b) AND (d))
2 b XOR c XOR d
3 (b AND c ) OR (b AND d) OR (c AND d)
4 b XOR c XOR d
How SHA-1 works.?
Single SHA-1 iteration
How SHA-1 works.?
 The values of W[t] are calculated as follows :
 For the first 16 words of W (i.e. t=0 to 15) , the
contents of the input message sub-block M[t] become
the contents of W[t].
 For the remaining 64 values of W are derived using the
equation
W[t] = s1 ( W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3])
Comparison
Application
 Secure password hashing
 Secure Socket Layer (SSL) security protocol
 Digital signature
 https://brilliant.org/wiki/secure-hashing-
algorithms/
 https://www.tutorialspoint.com/cryptography/c
ryptography_hash_functions.htm
 https://www.asd.gov.au/publications/protect/S
HA-1_Deprecated.pdf
References
Thank You !!

More Related Content

What's hot (20)

Hash Function
Hash Function
Siddharth Srivastava
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
Cryptography
Cryptography
subodh pawar
 
Principles of public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
MAC-Message Authentication Codes
MAC-Message Authentication Codes
DarshanPatil82
 
Public Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Hash function
Hash function
Harry Potter
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Key management
Key management
Sujata Regoti
 
block ciphers
block ciphers
Asad Ali
 
Message authentication
Message authentication
CAS
 
key distribution in network security
key distribution in network security
babak danyal
 
SHA 1 Algorithm.ppt
SHA 1 Algorithm.ppt
Rajapriya82
 
Double DES & Triple DES
Double DES & Triple DES
Hemant Sharma
 
Cryptography
Cryptography
Sidharth Mohapatra
 
Web Security
Web Security
Dr.Florence Dayana
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
 
Symmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
Principles of public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
MAC-Message Authentication Codes
MAC-Message Authentication Codes
DarshanPatil82
 
Public Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
block ciphers
block ciphers
Asad Ali
 
Message authentication
Message authentication
CAS
 
key distribution in network security
key distribution in network security
babak danyal
 
SHA 1 Algorithm.ppt
SHA 1 Algorithm.ppt
Rajapriya82
 
Double DES & Triple DES
Double DES & Triple DES
Hemant Sharma
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
 

Similar to SHA- Secure hashing algorithm (20)

SHA
SHA
SubashiniRathinavel
 
crypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.ppt
shuchiagarwal12
 
Secure hashing algorithm
Secure hashing algorithm
Karteek Paruchuri
 
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
KanchanPatil34
 
Sha
Sha
ha123
 
IRJET- Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2...
IRJET- Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2...
IRJET Journal
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Bitcoin Addresses
Bitcoin Addresses
ashmoran
 
AES.pptx
AES.pptx
RizwanBasha12
 
Data streaming algorithms
Data streaming algorithms
Hridyesh Bisht
 
Basic explanation to md5 implementation in C
Basic explanation to md5 implementation in C
Sourav Punoriyar
 
Hash mac algorithms
Hash mac algorithms
Young Alista
 
Hash mac algorithms
Hash mac algorithms
Tony Nguyen
 
Hash mac algorithms
Hash mac algorithms
David Hoen
 
Hash mac algorithms
Hash mac algorithms
Fraboni Ec
 
Hash& mac algorithms
Hash& mac algorithms
Harry Potter
 
Hash mac algorithms
Hash mac algorithms
Luis Goldster
 
Hash mac algorithms
Hash mac algorithms
James Wong
 
Module 2onblockchain technologies 2.pptx
Module 2onblockchain technologies 2.pptx
shruthig40
 
GOLDSTRIKETM 1: COINTERRA’S FIRST GENERATION CRYPTO-CURRENCY PROCESSOR FOR BI...
GOLDSTRIKETM 1: COINTERRA’S FIRST GENERATION CRYPTO-CURRENCY PROCESSOR FOR BI...
Javed Barkatullah
 
crypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.ppt
shuchiagarwal12
 
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
KanchanPatil34
 
IRJET- Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2...
IRJET- Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2...
IRJET Journal
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Bitcoin Addresses
Bitcoin Addresses
ashmoran
 
Data streaming algorithms
Data streaming algorithms
Hridyesh Bisht
 
Basic explanation to md5 implementation in C
Basic explanation to md5 implementation in C
Sourav Punoriyar
 
Hash mac algorithms
Hash mac algorithms
Young Alista
 
Hash mac algorithms
Hash mac algorithms
Tony Nguyen
 
Hash mac algorithms
Hash mac algorithms
David Hoen
 
Hash mac algorithms
Hash mac algorithms
Fraboni Ec
 
Hash& mac algorithms
Hash& mac algorithms
Harry Potter
 
Hash mac algorithms
Hash mac algorithms
James Wong
 
Module 2onblockchain technologies 2.pptx
Module 2onblockchain technologies 2.pptx
shruthig40
 
GOLDSTRIKETM 1: COINTERRA’S FIRST GENERATION CRYPTO-CURRENCY PROCESSOR FOR BI...
GOLDSTRIKETM 1: COINTERRA’S FIRST GENERATION CRYPTO-CURRENCY PROCESSOR FOR BI...
Javed Barkatullah
 
Ad

More from Ruchi Maurya (7)

Computer graphics - bresenham line drawing algorithm
Computer graphics - bresenham line drawing algorithm
Ruchi Maurya
 
Java- Datagram Socket class & Datagram Packet class
Java- Datagram Socket class & Datagram Packet class
Ruchi Maurya
 
Nams- Roots of equations by numerical methods
Nams- Roots of equations by numerical methods
Ruchi Maurya
 
Types of Addressing modes- COA
Types of Addressing modes- COA
Ruchi Maurya
 
Social networking
Social networking
Ruchi Maurya
 
Random access memory
Random access memory
Ruchi Maurya
 
open system interconnection
open system interconnection
Ruchi Maurya
 
Computer graphics - bresenham line drawing algorithm
Computer graphics - bresenham line drawing algorithm
Ruchi Maurya
 
Java- Datagram Socket class & Datagram Packet class
Java- Datagram Socket class & Datagram Packet class
Ruchi Maurya
 
Nams- Roots of equations by numerical methods
Nams- Roots of equations by numerical methods
Ruchi Maurya
 
Types of Addressing modes- COA
Types of Addressing modes- COA
Ruchi Maurya
 
Random access memory
Random access memory
Ruchi Maurya
 
open system interconnection
open system interconnection
Ruchi Maurya
 
Ad

Recently uploaded (20)

SEW make Brake BE05 – BE30 Brake – Repair Kit
SEW make Brake BE05 – BE30 Brake – Repair Kit
projectultramechanix
 
22PCOAM16 _ML_Unit 3 Notes & Question bank
22PCOAM16 _ML_Unit 3 Notes & Question bank
Guru Nanak Technical Institutions
 
Impurities of Water and their Significance.pptx
Impurities of Water and their Significance.pptx
dhanashree78
 
IntroSlides-June-GDG-Cloud-Munich community [email protected]
IntroSlides-June-GDG-Cloud-Munich community [email protected]
Luiz Carneiro
 
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
samueljackson3773
 
Blood bank management system project report.pdf
Blood bank management system project report.pdf
Kamal Acharya
 
Flow Chart Proses Bisnis prosscesss.docx
Flow Chart Proses Bisnis prosscesss.docx
rifka575530
 
operationg systemsdocumentmemorymanagement
operationg systemsdocumentmemorymanagement
SNIGDHAAPPANABHOTLA
 
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
djiceramil
 
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
djiceramil
 
Understanding Amplitude Modulation : A Guide
Understanding Amplitude Modulation : A Guide
CircuitDigest
 
社内勉強会資料_Chain of Thought .
社内勉強会資料_Chain of Thought .
NABLAS株式会社
 
The first edition of the AIAG-VDA FMEA.pptx
The first edition of the AIAG-VDA FMEA.pptx
Mayank Mathur
 
Engineering Mechanics Introduction and its Application
Engineering Mechanics Introduction and its Application
Sakthivel M
 
Week 6- PC HARDWARE AND MAINTENANCE-THEORY.pptx
Week 6- PC HARDWARE AND MAINTENANCE-THEORY.pptx
dayananda54
 
TEA2016AAT 160 W TV application design example
TEA2016AAT 160 W TV application design example
ssuser1be9ce
 
grade 9 science q1 quiz.pptx science quiz
grade 9 science q1 quiz.pptx science quiz
norfapangolima
 
NALCO Green Anode Plant,Compositions of CPC,Pitch
NALCO Green Anode Plant,Compositions of CPC,Pitch
arpitprachi123
 
Universal Human Values and professional ethics Quantum AKTU BVE401
Universal Human Values and professional ethics Quantum AKTU BVE401
Unknown
 
A Comprehensive Investigation into the Accuracy of Soft Computing Tools for D...
A Comprehensive Investigation into the Accuracy of Soft Computing Tools for D...
Journal of Soft Computing in Civil Engineering
 
SEW make Brake BE05 – BE30 Brake – Repair Kit
SEW make Brake BE05 – BE30 Brake – Repair Kit
projectultramechanix
 
Impurities of Water and their Significance.pptx
Impurities of Water and their Significance.pptx
dhanashree78
 
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
samueljackson3773
 
Blood bank management system project report.pdf
Blood bank management system project report.pdf
Kamal Acharya
 
Flow Chart Proses Bisnis prosscesss.docx
Flow Chart Proses Bisnis prosscesss.docx
rifka575530
 
operationg systemsdocumentmemorymanagement
operationg systemsdocumentmemorymanagement
SNIGDHAAPPANABHOTLA
 
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
djiceramil
 
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
djiceramil
 
Understanding Amplitude Modulation : A Guide
Understanding Amplitude Modulation : A Guide
CircuitDigest
 
社内勉強会資料_Chain of Thought .
社内勉強会資料_Chain of Thought .
NABLAS株式会社
 
The first edition of the AIAG-VDA FMEA.pptx
The first edition of the AIAG-VDA FMEA.pptx
Mayank Mathur
 
Engineering Mechanics Introduction and its Application
Engineering Mechanics Introduction and its Application
Sakthivel M
 
Week 6- PC HARDWARE AND MAINTENANCE-THEORY.pptx
Week 6- PC HARDWARE AND MAINTENANCE-THEORY.pptx
dayananda54
 
TEA2016AAT 160 W TV application design example
TEA2016AAT 160 W TV application design example
ssuser1be9ce
 
grade 9 science q1 quiz.pptx science quiz
grade 9 science q1 quiz.pptx science quiz
norfapangolima
 
NALCO Green Anode Plant,Compositions of CPC,Pitch
NALCO Green Anode Plant,Compositions of CPC,Pitch
arpitprachi123
 
Universal Human Values and professional ethics Quantum AKTU BVE401
Universal Human Values and professional ethics Quantum AKTU BVE401
Unknown
 

SHA- Secure hashing algorithm