SlideShare uma empresa Scribd logo
1 de 16
SECURE HASHING
ALGORITHM
By: Ruth Betcher
Purpose: Authentication
               Not Encryption
Authentication Requirements:
   Masquerade   – Insertion of message from
    fraudulent source
   Content Modification – Changing content of
    message
   Sequence Modification – Insertion, deletion
    and reordering sequence
   Timing Modification – Replaying valid
    sessions
Background Theory
•   Message Digest or “Fingerprint”
       → Condensed Representation
       → Easy to generate for a given file.
•   Computationally infeasible to produce two
    messages with same message digest
•   Impossible to recreate a message given a
    message digest.
•   Data Integrity and Comparison Checking
       → Message Integrity Validation
Applications:
   One-way hash functions
•   Public Key Algorithms
    –   Password Logins
    –   Encryption Key Management
    –   Digital Signatures
•   Integrity Checking
    –   Virus and Malware Scanning
•   Authentication
    –   Secure Web Connections
         •   (PGP, SSL, SSH, S/MIME)
Variants
•   MD4 and MD5 by Ron Rivest (1990,1994)
•   SHA-0, SHA-1 by NSA (1993, 1995)
•   RIPEMD-160 (1996)
•   SHA-2 (2002 – 224, 256, 385, 512)
•   Whirlpool
•   Tiger
•   GOST-3411
•   SHA-3
    •   Winner selected from solicitations in 2012
Basic Hash Function Diagram
Message Diagram
SHA-1 (160 bit message)
Algorithm Framework
   Step 1: Append Padding Bits….
    Message is “padded” with a 1 and as many 0’s as
    necessary to bring the message length to 64 bits fewer
    than an even multiple of 512.
   Step 2: Append Length....
    64 bits are appended to the end of the padded message. These bits
    hold the binary format of 64 bits indicating the length of the original
    message.
   http://www.herongyang.com

        f
SHA-1 Framework Continued
   Step 3: Prepare Processing Functions….
    SHA1 requires 80 processing functions defined as:
             f(t;B,C,D) = (B AND C) OR ((NOT B) AND D) ( 0 <= t <= 19)
             f(t;B,C,D) = B XOR C XOR D                (20 <= t <= 39)
             f(t;B,C,D) = (B AND C) OR (B AND D) OR (C AND D) (40 <= t <=59)
             f(t;B,C,D) = B XOR C XOR D                 (60 <= t <= 79)

   Step 4: Prepare Processing Constants....
    SHA1 requires 80 processing constant words defined as:
             K(t) = 0x5A827999              ( 0 <= t <= 19)
             K(t) = 0x6ED9EBA1              (20 <= t <= 39)
             K(t) = 0x8F1BBCDC              (40 <= t <= 59)
             K(t) = 0xCA62C1D6              (60 <= t <= 79)

   http://www.herongyang.com
SHA-1 Framework Continued
   Step 5: Initialize Buffers….
    SHA1 requires 160 bits or 5 buffers of words (32 bits):
                       H0 = 0x67452301
                       H1 = 0xEFCDAB89
                       H2 = 0x98BADCFE
                       H3 = 0x10325476
                       H4 = 0xC3D2E1F0
   http://www.herongyang.com
SHA-1 Framework Final Step
   Step 6: Processing Message in 512-bit
    blocks (L blocks in total message)….
    This is the main task of SHA1 algorithm which loops through the
    padded and appended message in 512-bit blocks.
    Input and predefined functions:
          M[1, 2, ..., L]: Blocks of the padded and appended message
    f(0;B,C,D), f(1,B,C,D), ..., f(79,B,C,D): 80 Processing Functions   K(0),
    K(1), ..., K(79): 80 Processing Constant Words
          H0, H1, H2, H3, H4, H5: 5 Word buffers with initial values

   http://www.herongyang.com
SHA-1 Framework Continued
   Step 6: Pseudo Code….
    For loop on k = 1 to L
          (W(0),W(1),...,W(15)) = M[k]       /* Divide M[k] into 16 words */
          For t = 16 to 79 do:
                   W(t) = (W(t-3) XOR W(t-8) XOR W(t-14) XOR W(t-16)) <<< 1
           A = H0, B = H1, C = H2, D = H3, E = H4
           For t = 0 to 79 do:
                TEMP = A<<<5 + f(t;B,C,D) + E + W(t) + K(t) E = D, D = C,
                             C = B<<<30, B = A, A = TEMP
           End of for loop
           H0 = H0 + A, H1 = H1 + B, H2 = H2 + C, H3 = H3 + D, H4 = H4 + E
       End of for loop

Output:
              H0, H1, H2, H3, H4, H5: Word buffers with final message digest
   http://www.herongyang.com
Message Diagram
SHA-1 Message Digest

The message digest of the string:

                “This is a test for theory of computation”



     4480afca4407400b035d9debeb88bfc402db514f
Cryptanalysis and Limitation

•   Key Premises for Hash Functions:
       1. Impossible to re-create a message
    given a fingerprint
       2. Collision Free

•   SHA-1 failure using brute force attack in 280 operations
•   Collision failure found in 2005 in 233 operations
Bibliography
   http://www.herongyang.com
   http://www.ipa.go.jp/security
   Salomon, David, Foundations of Computer
    Security Springer-Verlag London Limited 2006.
   Schneier, Bruce, “Opinion: Cryptanalysis of MD
    % and SHA: Time for a new standard”,
    Computer World, August 2004.
   Stallings, William, Cryptography and Network
    Security, Prentice Hall, 1999.
   Tanenbaum, Andrew, Computer Networks,
    Prentice Hall, 2003.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing Functions
 
block ciphers
block ciphersblock ciphers
block ciphers
 
MD5
MD5MD5
MD5
 
Hashing
HashingHashing
Hashing
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Ipsec
IpsecIpsec
Ipsec
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
 
Two fish cipher
Two fish cipherTwo fish cipher
Two fish cipher
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
SHA 1 Algorithm.ppt
SHA 1 Algorithm.pptSHA 1 Algorithm.ppt
SHA 1 Algorithm.ppt
 
Blow fish final ppt
Blow fish final pptBlow fish final ppt
Blow fish final ppt
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Rc4
Rc4Rc4
Rc4
 
Aes
AesAes
Aes
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Wi-FI Hacking
Wi-FI Hacking Wi-FI Hacking
Wi-FI Hacking
 
Ipsec
IpsecIpsec
Ipsec
 

Semelhante a Secure hashing algorithm

Semelhante a Secure hashing algorithm (20)

Sha
ShaSha
Sha
 
Hashfunction
HashfunctionHashfunction
Hashfunction
 
Hashfunction
HashfunctionHashfunction
Hashfunction
 
Hashfunction
HashfunctionHashfunction
Hashfunction
 
Hashfunction
HashfunctionHashfunction
Hashfunction
 
Hashfunction
HashfunctionHashfunction
Hashfunction
 
Hashfunction
HashfunctionHashfunction
Hashfunction
 
crypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.pptcrypto secure-hash-algorithm-versions.ppt
crypto secure-hash-algorithm-versions.ppt
 
Ch12
Ch12Ch12
Ch12
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithms
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Data streaming algorithms
Data streaming algorithmsData streaming algorithms
Data streaming algorithms
 

Último

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Último (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Secure hashing algorithm

  • 2. Purpose: Authentication Not Encryption Authentication Requirements:  Masquerade – Insertion of message from fraudulent source  Content Modification – Changing content of message  Sequence Modification – Insertion, deletion and reordering sequence  Timing Modification – Replaying valid sessions
  • 3. Background Theory • Message Digest or “Fingerprint” → Condensed Representation → Easy to generate for a given file. • Computationally infeasible to produce two messages with same message digest • Impossible to recreate a message given a message digest. • Data Integrity and Comparison Checking → Message Integrity Validation
  • 4. Applications: One-way hash functions • Public Key Algorithms – Password Logins – Encryption Key Management – Digital Signatures • Integrity Checking – Virus and Malware Scanning • Authentication – Secure Web Connections • (PGP, SSL, SSH, S/MIME)
  • 5. Variants • MD4 and MD5 by Ron Rivest (1990,1994) • SHA-0, SHA-1 by NSA (1993, 1995) • RIPEMD-160 (1996) • SHA-2 (2002 – 224, 256, 385, 512) • Whirlpool • Tiger • GOST-3411 • SHA-3 • Winner selected from solicitations in 2012
  • 8. SHA-1 (160 bit message) Algorithm Framework  Step 1: Append Padding Bits…. Message is “padded” with a 1 and as many 0’s as necessary to bring the message length to 64 bits fewer than an even multiple of 512.  Step 2: Append Length.... 64 bits are appended to the end of the padded message. These bits hold the binary format of 64 bits indicating the length of the original message.  http://www.herongyang.com f
  • 9. SHA-1 Framework Continued  Step 3: Prepare Processing Functions…. SHA1 requires 80 processing functions defined as: f(t;B,C,D) = (B AND C) OR ((NOT B) AND D) ( 0 <= t <= 19) f(t;B,C,D) = B XOR C XOR D (20 <= t <= 39) f(t;B,C,D) = (B AND C) OR (B AND D) OR (C AND D) (40 <= t <=59) f(t;B,C,D) = B XOR C XOR D (60 <= t <= 79)  Step 4: Prepare Processing Constants.... SHA1 requires 80 processing constant words defined as: K(t) = 0x5A827999 ( 0 <= t <= 19) K(t) = 0x6ED9EBA1 (20 <= t <= 39) K(t) = 0x8F1BBCDC (40 <= t <= 59) K(t) = 0xCA62C1D6 (60 <= t <= 79)  http://www.herongyang.com
  • 10. SHA-1 Framework Continued  Step 5: Initialize Buffers…. SHA1 requires 160 bits or 5 buffers of words (32 bits): H0 = 0x67452301 H1 = 0xEFCDAB89 H2 = 0x98BADCFE H3 = 0x10325476 H4 = 0xC3D2E1F0  http://www.herongyang.com
  • 11. SHA-1 Framework Final Step  Step 6: Processing Message in 512-bit blocks (L blocks in total message)…. This is the main task of SHA1 algorithm which loops through the padded and appended message in 512-bit blocks. Input and predefined functions: M[1, 2, ..., L]: Blocks of the padded and appended message f(0;B,C,D), f(1,B,C,D), ..., f(79,B,C,D): 80 Processing Functions K(0), K(1), ..., K(79): 80 Processing Constant Words H0, H1, H2, H3, H4, H5: 5 Word buffers with initial values  http://www.herongyang.com
  • 12. SHA-1 Framework Continued  Step 6: Pseudo Code…. For loop on k = 1 to L (W(0),W(1),...,W(15)) = M[k] /* Divide M[k] into 16 words */ For t = 16 to 79 do: W(t) = (W(t-3) XOR W(t-8) XOR W(t-14) XOR W(t-16)) <<< 1 A = H0, B = H1, C = H2, D = H3, E = H4 For t = 0 to 79 do: TEMP = A<<<5 + f(t;B,C,D) + E + W(t) + K(t) E = D, D = C, C = B<<<30, B = A, A = TEMP End of for loop H0 = H0 + A, H1 = H1 + B, H2 = H2 + C, H3 = H3 + D, H4 = H4 + E End of for loop Output: H0, H1, H2, H3, H4, H5: Word buffers with final message digest  http://www.herongyang.com
  • 14. SHA-1 Message Digest The message digest of the string: “This is a test for theory of computation” 4480afca4407400b035d9debeb88bfc402db514f
  • 15. Cryptanalysis and Limitation • Key Premises for Hash Functions: 1. Impossible to re-create a message given a fingerprint 2. Collision Free • SHA-1 failure using brute force attack in 280 operations • Collision failure found in 2005 in 233 operations
  • 16. Bibliography  http://www.herongyang.com  http://www.ipa.go.jp/security  Salomon, David, Foundations of Computer Security Springer-Verlag London Limited 2006.  Schneier, Bruce, “Opinion: Cryptanalysis of MD % and SHA: Time for a new standard”, Computer World, August 2004.  Stallings, William, Cryptography and Network Security, Prentice Hall, 1999.  Tanenbaum, Andrew, Computer Networks, Prentice Hall, 2003.

Notas do Editor

  1. Verify that received messages come from the alleged source and have not been altered. Also verify the sequence and timing. Digital Signature is used to combat denial of receipt of a message by either the source or desitination.
  2. All variants have a similar framework. The variation is in the bits compressed into the digest. Thereby, differ in the number of blocks and words of data used in hashing.