SlideShare a Scribd company logo
4
Most read
5
Most read
6
Most read
Internet Network Security
Created by:
Ruchi Maurya
Secure Hashing Algorithm
(SHA)
Introduction
Sha-1
How SHA-1 works
Comparison
Application
References
 Developed by NIST along with NSA
 In 1993, SHA was published as a Federal
Information Processing Standard
 It has following versions-
 SHA-0
 SHA-1
 SHA-224
 SHA-256
 SHA-512
introduction
 It works for any input message that is less than
264 bits.
 The output of SHA is a message digest of 160 bits
in length.
 This is designed to be computationally infeasible
to:
 Obtain the original message , given its
message digest.
 Find two messages producing the same
message digest
SHA-1
How SHA-1 works.?
 Step 1: Padding of Bits
 Step 2: Append Length
 Step 3: Divide the input into 512-bit blocks
How SHA-1 works.?
 Step 4: Initialize chaining variables
 Step 5: Process Blocks- Now the actual algorithm
begins….
Chaining Variables Hex values
A 01 23 45 67
B 89 AB CD EF
C FE DC BA 98
D 76 54 32 10
E C3 D2 E1 F0
How SHA-1 works.?
 Step 5.1 : Copy chaining variables A-E into variables
a-e.
 Step 5.2 : Divide current 512-bit block into 16 sub-
blocks of 32-bits.
 Step 5.3 : SHA has 4 rounds, each consisting of 20
steps. Each round takes 3 inputs-
 512-bit block,
 The register abcde
 A constant K[t] (where t= 0 to 79)
How SHA-1 works.?
 Step 5.4 : SHA has a total of 80 iterations (4 rounds X 20 -
iterations). Each iteration consists of following operations:-
abcde = ( e +Process P + S5(a) + W[t] + K[t] ), a, S30(b) , c , d
Where,
abcde = The register made up of 5 variables a, b, c, d, e.
Process P = The logic operation.
St = Circular-left shift of 32-bit sub-block by t bits.
W[t[ = A 32-bit derived from the current 32-bit sub-block.
K[t] = One of the five additive constants.
How SHA-1 works.?
 Process P in each SHA round
Round Process P
1 (b AND c) OR (( NOT b) AND (d))
2 b XOR c XOR d
3 (b AND c ) OR (b AND d) OR (c AND d)
4 b XOR c XOR d
How SHA-1 works.?
Single SHA-1 iteration
How SHA-1 works.?
 The values of W[t] are calculated as follows :
 For the first 16 words of W (i.e. t=0 to 15) , the
contents of the input message sub-block M[t] become
the contents of W[t].
 For the remaining 64 values of W are derived using the
equation
W[t] = s1 ( W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3])
Comparison
Application
 Secure password hashing
 Secure Socket Layer (SSL) security protocol
 Digital signature
 https://brilliant.org/wiki/secure-hashing-
algorithms/
 https://www.tutorialspoint.com/cryptography/c
ryptography_hash_functions.htm
 https://www.asd.gov.au/publications/protect/S
HA-1_Deprecated.pdf
References
Thank You !!

More Related Content

What's hot (20)

PPTX
Hash function
Salman Memon
 
DOCX
S/MIME
maria azam
 
PPTX
Hash Function
Siddharth Srivastava
 
PPTX
Pgp pretty good privacy
Pawan Arya
 
PPT
block ciphers
Asad Ali
 
PDF
AES-Advanced Encryption Standard
Prince Rachit
 
PPTX
Data Encryption Standard (DES)
Haris Ahmed
 
PDF
Web Security
Dr.Florence Dayana
 
PPT
Message authentication
CAS
 
PPT
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
 
PDF
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
PDF
2. public key cryptography and RSA
Dr.Florence Dayana
 
PPTX
Elgamal & schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
PPT
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
PPTX
Transposition Cipher
daniyalqureshi712
 
PPTX
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
PPTX
Message digest 5
Tirthika Bandi
 
PDF
symmetric key encryption algorithms
Rashmi Burugupalli
 
Hash function
Salman Memon
 
S/MIME
maria azam
 
Hash Function
Siddharth Srivastava
 
Pgp pretty good privacy
Pawan Arya
 
block ciphers
Asad Ali
 
AES-Advanced Encryption Standard
Prince Rachit
 
Data Encryption Standard (DES)
Haris Ahmed
 
Web Security
Dr.Florence Dayana
 
Message authentication
CAS
 
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
 
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
2. public key cryptography and RSA
Dr.Florence Dayana
 
Elgamal & schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
Transposition Cipher
daniyalqureshi712
 
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
Message digest 5
Tirthika Bandi
 
symmetric key encryption algorithms
Rashmi Burugupalli
 

Similar to SHA- Secure hashing algorithm (20)

PPT
crypto secure-hash-algorithm-versions.ppt
shuchiagarwal12
 
PPTX
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
NAtional Institute of TEchnology Rourkela , Galgotias University
 
PPTX
Secure Hash Algorithm (SHA)
ShahDhruv21
 
PPT
Secure hashing algorithm
Karteek Paruchuri
 
PPTX
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
PDF
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
KanchanPatil34
 
PDF
Network security CS6
Infinity Tech Solutions
 
PDF
Sha
ha123
 
PDF
The SHA Hashing Algorithm
Bob Landstrom
 
PPT
Hash mac algorithms
Fraboni Ec
 
PPT
Hash mac algorithms
Tony Nguyen
 
PPT
Hash mac algorithms
Luis Goldster
 
PPT
Hash mac algorithms
David Hoen
 
PPT
Hash mac algorithms
James Wong
 
PPT
Hash& mac algorithms
Harry Potter
 
PPT
Hash mac algorithms
Young Alista
 
PPTX
Sha-1 Collision
University of South Wales
 
PPTX
Hash algorithms in IT security
University of South Wales
 
PDF
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
IJCNCJournal
 
crypto secure-hash-algorithm-versions.ppt
shuchiagarwal12
 
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
NAtional Institute of TEchnology Rourkela , Galgotias University
 
Secure Hash Algorithm (SHA)
ShahDhruv21
 
Secure hashing algorithm
Karteek Paruchuri
 
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
KanchanPatil34
 
Network security CS6
Infinity Tech Solutions
 
Sha
ha123
 
The SHA Hashing Algorithm
Bob Landstrom
 
Hash mac algorithms
Fraboni Ec
 
Hash mac algorithms
Tony Nguyen
 
Hash mac algorithms
Luis Goldster
 
Hash mac algorithms
David Hoen
 
Hash mac algorithms
James Wong
 
Hash& mac algorithms
Harry Potter
 
Hash mac algorithms
Young Alista
 
Sha-1 Collision
University of South Wales
 
Hash algorithms in IT security
University of South Wales
 
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
IJCNCJournal
 
Ad

More from Ruchi Maurya (7)

PPTX
Computer graphics - bresenham line drawing algorithm
Ruchi Maurya
 
PDF
Java- Datagram Socket class & Datagram Packet class
Ruchi Maurya
 
PPTX
Nams- Roots of equations by numerical methods
Ruchi Maurya
 
PPTX
Types of Addressing modes- COA
Ruchi Maurya
 
PPTX
Social networking
Ruchi Maurya
 
PPTX
Random access memory
Ruchi Maurya
 
PPTX
open system interconnection
Ruchi Maurya
 
Computer graphics - bresenham line drawing algorithm
Ruchi Maurya
 
Java- Datagram Socket class & Datagram Packet class
Ruchi Maurya
 
Nams- Roots of equations by numerical methods
Ruchi Maurya
 
Types of Addressing modes- COA
Ruchi Maurya
 
Social networking
Ruchi Maurya
 
Random access memory
Ruchi Maurya
 
open system interconnection
Ruchi Maurya
 
Ad

Recently uploaded (20)

PDF
WD2(I)-RFQ-GW-1415_ Shifting and Filling of Sand in the Pond at the WD5 Area_...
ShahadathHossain23
 
PDF
A Brief Introduction About Robert Paul Hardee
Robert Paul Hardee
 
PDF
Submit Your Papers-International Journal on Cybernetics & Informatics ( IJCI)
IJCI JOURNAL
 
PPTX
Introduction to Internal Combustion Engines - Types, Working and Camparison.pptx
UtkarshPatil98
 
PPTX
Fundamentals of Quantitative Design and Analysis.pptx
aliali240367
 
PDF
this idjfk sgfdhgdhgdbhgbgrbdrwhrgbbhtgdt
WaleedAziz7
 
PDF
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...
ijujournal
 
PPTX
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
PDF
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
 
PPTX
Introduction to File Transfer Protocol with commands in FTP
BeulahS2
 
PDF
William Stallings - Foundations of Modern Networking_ SDN, NFV, QoE, IoT, and...
lavanya896395
 
PDF
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
PPTX
Explore USA’s Best Structural And Non Structural Steel Detailing
Silicon Engineering Consultants LLC
 
PPTX
Seminar Description: YOLO v1 (You Only Look Once).pptx
abhijithpramod20002
 
PDF
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
PPTX
Engineering Quiz ShowEngineering Quiz Show
CalvinLabial
 
PPTX
Precooling and Refrigerated storage.pptx
ThongamSunita
 
PPTX
UNIT 1 - INTRODUCTION TO AI and AI tools and basic concept
gokuld13012005
 
PPTX
Unit_I Functional Units, Instruction Sets.pptx
logaprakash9
 
PDF
Pictorial Guide To Checks On Tankers' IG system
Mahmoud Moghtaderi
 
WD2(I)-RFQ-GW-1415_ Shifting and Filling of Sand in the Pond at the WD5 Area_...
ShahadathHossain23
 
A Brief Introduction About Robert Paul Hardee
Robert Paul Hardee
 
Submit Your Papers-International Journal on Cybernetics & Informatics ( IJCI)
IJCI JOURNAL
 
Introduction to Internal Combustion Engines - Types, Working and Camparison.pptx
UtkarshPatil98
 
Fundamentals of Quantitative Design and Analysis.pptx
aliali240367
 
this idjfk sgfdhgdhgdbhgbgrbdrwhrgbbhtgdt
WaleedAziz7
 
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...
ijujournal
 
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
 
Introduction to File Transfer Protocol with commands in FTP
BeulahS2
 
William Stallings - Foundations of Modern Networking_ SDN, NFV, QoE, IoT, and...
lavanya896395
 
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
Explore USA’s Best Structural And Non Structural Steel Detailing
Silicon Engineering Consultants LLC
 
Seminar Description: YOLO v1 (You Only Look Once).pptx
abhijithpramod20002
 
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
Engineering Quiz ShowEngineering Quiz Show
CalvinLabial
 
Precooling and Refrigerated storage.pptx
ThongamSunita
 
UNIT 1 - INTRODUCTION TO AI and AI tools and basic concept
gokuld13012005
 
Unit_I Functional Units, Instruction Sets.pptx
logaprakash9
 
Pictorial Guide To Checks On Tankers' IG system
Mahmoud Moghtaderi
 

SHA- Secure hashing algorithm