Review Paper On Secure Hash Algorithm With Its Variants: Research
Review Paper On Secure Hash Algorithm With Its Variants: Research
net/publication/326009898
CITATIONS READS
9 7,275
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Aradhana Sahu on 27 June 2018.
Abstract: The Cryptographic hash function is produce irreversible and unique hash value. It provides greater resistance
against attack .The variants of SHA algorithm are designed differently named are SHA-0, SHA-1, SHA-2, and SHA-3.
This is a review paper which includes the comparisons between different secure hashing algorithms.
1. Introduction
A cryptographic hash function is a hash function. It takes an arbitrary block of input string and returns a fixed-size bit of
output string. The cryptographic hash values differ such that any accidental or intentional change to the data. The data to be
encoded are often called the message and the hash value is called the message digest. The SHA Algorithm is used in digital
certificate as well as in data integrity and massage authentication.SHA is a fingerprint that specifics the data and was
developed by N.I.S.T. as a U.S. Federal Information Processing Standard (FIPS), is intended for use with digital signature
applications [1].
As a wide use of internet day by day it is needed that a proper file has been download from peer to peer (P2P) servers and
network. Due to present of same name file it is quite difficult to find the original so message digest plays an
important role in such type of downloads. These type of file may be bound with message authentication code which proves
that the source is verified otherwise it shows the warning that verified source not found or vice versa
• Key generation: key can be generated from digest of pass-phrase; can be made computationally expensive to prevent
brute-force attacks.
1.1 SHA-0
SHA -0 is160-bit hash function published in 1993 under the name "SHA". It was withdrawn shortly after publication due to
an undisclosed "significant flaw" and replaced by the slightly revised version SHA-1.
1.2 SHA-1
SHA-1 produces a message digest based on principles MD4 and MD5. SHA-1 differs from SHA -0 only by a single bitwise
rotation in the message schedule of its compression function.SHA – 1 produces a 160 bit hash value known as message
digest. This hash value is rendered as hexadecimal number .It is 40 digits long.
Step 1:- Bits Padding:-Add Padding to the end of the genuine message length is 64 bits and multiple of 512.
Step2:- Appending length: - In this step the excluding length is calculated.
Step3:- Divide the Input Text into 512-bit blocks :- We divide the input in the 512 bit blocks
Step4:-Initialize chaining variables. In this step we initializing chaining variables here we initialize 5 chaining variables of 32
bit each=160 bit of total.
Step5:-Process Blocks
1) Copy the chaining variables
2) Divide the 512 into 16 sub blocks
3) Process 4 rounds of 20 steps each
SHA-1 forms part of several widely used security applications and protocols, including TLS and SSL, PGP, SSH, S/MIME,
and IPsec. SHA-1 hashing is also used in distributed revision control systems
1.3 SHA -2
SHA-2 includes significant changes from its predecessor SHA-1. The SHA-2 family consists of six hash functions .they are
SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224,SHA-512/256.SHA-256 and SHA-512 are novel hash functions
computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their
structures are otherwise virtually identical, differing only in the number of rounds[7].
SHA-224 and SHA-384 are simply truncated versions of the first two, computed with different initial values. SHA-512/224
and SHA-512/256 are also truncated versions of SHA-512.
SHA-256 partakes in the process of authenticating Debian software packages and in the DKIM message signing standard.
SHA-512 is part of a system to authenticate archival video from the International Criminal Tribunal of the Rwandan
genocide. SHA-256 and SHA-512 are proposed for
use in DNSSEC. Unix and Linux vendors are moving to using 256-bit and 512-bit SHA-2 for secure password hashing.
1.4 SHA -3
SHA-3 uses the sponge construction in which data is "absorbed" into the sponge and then the result is "squeezed" out. In the
absorbing phase, message blocks are XORed into a subset of the state, which is then transformed as a whole. In the "squeeze"
phase, output blocks are read from the same subset of the state, alternated with state transformations.
In SHA-3, the state consists of a 5 × 5 array of 64-bit words, 1600 bits total. Keccak is also defined for smaller power-of-2
word sizes w down to 1 bit (25 bits total state). Small state sizes can be used to test cryptanalytic attacks, and intermediate
state sizes (from w = 8, 200 bits, to w = 32, 800 bits) can be used in practical, lightweight applications.
The block transformation is a permutation that uses xor, and and not operations, and designed for easy implementation in
both software and hardware
Block permutation:
The SHA-3 family consists of four cryptographic hash functions SHA3-224, SHA3-256, SHA3-384 and SHA3-512 and SHA
3- 512 has two extendable output functions SHAKE128 and SHAKE256.It is different in internal structure extension attacks,
which affect all MD hashes like MD5, SHA-1, and SHA-2.
2. LITERATURE REVIEW
A several analysis by numerous researches is work on SHA and its variants. The outline of the analysis is reviewed as
follows:
Yea
Author Title Outcomes
r
Piyush 2012 Performance It has been
Garg, Analysis of observed that
and SHA SHA-160 and
Namita Algorithms SHA-192 are
Tiwari (SHA-1 and better in
SHA-192): A respective field.
Review SHA-192
algorithm is more
secure in terms of
the number of
brute force
attacks needed to
break it and
SHA-160 is fast
when compared
to the other
secure hash
algorithms.
Priyank 2014 Review Paper SHA is more
a on Secure secure than MD5
Vadher Hashing but on the other
a Algorithm and hand MD5 is
and Its more fast than
Bhumi Variants SHA on 32 bit
ka Lall machines.
Piyush 2014 A SHA is more
Gupta, Comparative secure than MD5
and Analysis of but on the
Sandee SHA and MD5 other hand MD5
p Algorithm is more fast than
Kumar SHA on 32 bit
machines.
Snigdha 2015 Secure and This paper
Soni Efficient discussed one of
and Integrity the problems
Pratap Algorithm faced in integrity
Singh based on algorithms that
Existing SHA all existing
Algorithms algorithms are
either proven
breakable or not
time efficient
C.G 2015 A SHA algorithms’
Thoma Comparative performance rate
s Study on is comparatively
and Different better than
Robin Hashing cryptographic
Thoma Algorithms hash algorithm
s Jose functions
Variants of SHA algorithms are differ in both construction and how the resulting hash is created from the original data and in
the bit-length of the signature primarily. We focus on the bit-length as the important.
and, or,
SHA-0 160 160 512 264 − 1 32 80 Yes -
xor, rot
and, or, Theoretical
HA-1 160 160 512 264 − 1 32 80 192
xor, rot attack
SHA-
and, or,
224 224
256 512 264 − 1 32 64 xor, shr, None 139
SHA- 256
rot
256
SHA-
SHA- 384
2 SHA- 384
and, or,
512 512
512 1024 2128 − 1 64 80 xor, shr, None 154
SHA- 224
rot
512/224 256
SHA-
512/256
SHA3-
224
SHA3- 224 1152
256 256 1088
None -
SHA3- 384 832
384 512 576
SHA 1600 and, not,
SHA3- unlimited 64 24
-3 (5x5x64) xor, rot
518
SHAE
128 d 1344
None -
SHAE (arbitrary) 1088
256
4. EXAMPLE EXECUTION
These three strings hash value, password, cryptography were taken as sample string for generating massage digest for SHA -
1,SHA-2 and SHA-3. The following results have come out using JAVA tool. This proves that new version (SHA-2 and SHA-
3) is more secure than SHA-1 but on the other hand SHA-1 is relatively faster than its versions .
5. RESULT
The following chart shows the length of the output digit of SHA and its variants.
5. CONCLUSION
This research paper consists of comparisons between different secure hashing algorithms and its variants. Each
algorithm takes the time for the computation of hash value. By computing the time required from each of these algorithm
and finding the algorithm which will require the less amount of time for computation of the hash value As a future work, we
propose to implement double hashing .We can combine the best secure hashing algorithm for network security so as to
increase the security of the data being sent in clouds.
IJTIMES-2017@All rights reserved 6
International Journal of Technical Innovation in Modern Engineering & Science (IJTIMES)
Volume 3, Issue 05, May-2017, e-ISSN: 2455-2584, Impact Factor: 3.45 (SJIF-2015)
6. REFERENCES
[1] Kasgar A. K., Agrawal Jitendra, Sahu Santosh, 2012, “New Modified 256-bit MD5 Algorithm with SHA Compression
Funct ion”, IJCA (0975–8887) Volume 42 (12) , pp47-51.
[2] Rivest R., 1992, “The MD5 Message-Digest Algorithm,”RFC 1321,MIT LCS and RSA Data Securit y, Inc.
[3] Kahate, Atul, 2003, "Cryptography and Network Securit y", TataMcGraw-Hill ,India.
[4] William Stallings, Cryptography and NetworkSecurity: Priciples and Practice,5th Edit ionPrent ice Hall; 5 edit ion
(January 24, 2010).
[5] Vandana P., V.K Mishra, Architecture based on MD5 and MD5-512Bit Applications , IJCA(0975 – 8887)Vol. 74– No.9,
July 2013.
[6]Piyush Gupta et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014,
4492-4495
[7]www. http://www.sha1-online.com/