SlideShare a Scribd company logo
Cryptography and Cyber Security
[IT311]
Sanjivani Rural Education Society’s
Sanjivani College of Engineering, Kopargaon-423603
(An Autonomous Institute Affiliated to Savitribai Phule Pune University, Pune)
NAAC ‘A’ Grade Accredited, ISO 9001:2015 Certified
Department of Information Technology
(NBAAccredited)
Mrs. Kanchan D. Patil
Assistant Professor
Unit 3: Message Digest & Key Management
• Hash Algorithms: SHA-1, MD5, Key Management: Introduction, Key
Management: Generations, Distribution, Updation, Digital Certificate,
Digital Signature, Kerberos 5.0.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Secure Hash Algorithm (SHA)
• Secure Hash Algorithms (SHA) was developed by National Institute of
Standards and Technology (NIST) along with NSA
• Published as a Federal Information Processing Standards Publications (FIPS
180 PUBS) in 1993
• A revised version was issued as FIPS PUB 180-1 in 1995 and is referred to as
SHA-1
• SHA is a modified version of MD5
• Name of Standard: Secure Hash Signature Standard (SHS)
• In 2002 , NIST produced a revised version of the standard, FIPS 180-2 that
defined three new versions of SHA as SHA-256, SHA-384, and SHA-512.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Secure Hash Algorithm (SHA) : Purpose
• Purpose of SHA is authentication and not the encryption
• Verify that received messages come from the alleged source and have not
been altered.
• Verify the sequence and timing.
• Digital Signature is used to combat denial of receipt of a message by either
the source or destination.
• Impossible to recreate a message given a message digest.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Secure Hash Algorithm (SHA) : Applications
• SHA uses one way hash function. The applications are as follows:
• Public Key Algorithms
• Password Logins
• Encryption Key Management
• Digital Signatures
• Integrity Checking
• Virus and Malware Scanning
• Authentication
• Secure Web Connections (PGP, SSL, SSH, S/MIME)
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Secure Hash Algorithm (SHA) : Variants
• MD4 and MD5 by Ron Rivest (1990,1994)
• SHA-0, SHA-1 by NSA (1993, 1995)
• RIPEMD-160 (1996)
• SHA-2 (2002 – 224, 256, 385, 512)
• Whirlpool
• Tiger
• GOST-3411
• SHA-3
• Winner selected from solicitations in 2012
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Structure of SHA
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• SHA is closely modeled after MD5
• Step 1: Padding
• To add padding to the end of the original message in such a way that the
length of the message is 64 bits short of a multiple of 512.
• Like MD5, the padding always added, even if the message is already 64
bits short of a multiple of 512.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 2: Append length
• The length of the message excluding the length of the padding is
calculated and appended to the end of the padding as a 64-bit block.
• Step 3: Divide the input into 512-bit blocks
• The input message is now divided into blocks, of length 512 bits.
• These blocks become the input to the message digest processing logic.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 4: Initialize chaining variables
• Five chaining variables A through E
• In the case of SHA want to produce a message digest of length 160 bits,
we need to have five chaining variables here (5 x 32 = 160 bits).
• In SHA, the variables A through D have the same values as they had in
MD5
• Additionally, E is initialized to Hex C3 D2 E1 F0.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5: Process Blocks
• Step 5.1:
• Copy the chaining variables A-E into variables a-e.
• The combination of a-e, called as abede will be considered as a
single register for storing the temporary intermediate as well as the
final results.
• Step 5.2:
• Now, divide the current 512-bit block into 16 sub-blocks, each
consisting of 32 bits.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5: Process Blocks
• Step 5.3: SHA has four rounds, each round consisting of 20 steps.
• Each round takes three inputs
• Current 512- bit block
• Register abcde
• A constant K[t] (where t=0 to 79)
• It then updates the contents of the register abcde using the SHA
algorithm steps.
• We have only four constants (in case of MD5-64 constants) defined
for K[t], one used in each of the four rounds.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5: Process Blocks
• Step 5.3: We have only four constants (in case of MD5- 64 constants)
defined for K[t], one used in each of the four rounds.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5.4
• SHA consists of four rounds, each round containing 20 iterations.
• This makes it a total of 80 iterations.
• Mathematically, an iteration consists of the following operations:
abcde = (e + Process P+s^5(a)+ W[t] + K[t]), a, s^30 (b), c,d
Where,
abcde = The register made up of the five variables a, b, c, d and e
Process P = The logical operation
S^t = Circular-left shift of the 32-bit sub-block by t bits
W[t] = A 32-bit derived from the current 32-bit sub block
K[t] = One of the five additive constants
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA : Single SHA-1 Iteration
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5.4 : Process P in each SHA-1 round
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Working of SHA
• Step 5.4
• The values of W[t] can be calculated as follows:
• For the first 16 words of W (ie. t = 0 to 15), the contents of the input
message sub-block M[t] become the contents of W[t] straightaway.
• That is, the first 16 blocks of the input message M copied to W.
• The remaining 64 values of W are derived using the equation:
W[t] = s' (W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3])
s' indicates a circular-left shift (i.e. rotation) by 1 bit position.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cryptanalysis and Limitation
• Key Premises for Hash Functions:
• Impossible to re-create a message given a fingerprint
• Collision Free
• SHA-1 failure using brute force attack in 2^80 operations
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Comparison of SHA Parameters
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Difference Between MD5 and SHA-1
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Sr.
No.
Points of Discussion MD5 SHA-1
1 Message digest length in bits 128 160
2 Attack to try and find the original
message given a message digest
Requires 2^128 operations to
break in
Requires 2^160 operations to
break in. more secure
3 Attack to try and find two
messages producing the same
message digest
Requires 2^64 operations to
break in
Requires 2^80 operations to
break in
4 Successful attacks so far Attempts reported so far No reported yet
5 Speed Faster (64 iterations and 128-
bit buffer)
Slower (80 iterations and 160-
bit buffer)
6 Software implementation Simple. Does not need any
large programs or complex
tables
Simple. Does not need any
large programs or complex
tables
References:
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
• Atul Kahate,”Cryptography and Network Security”, second edition, Tata
McGraw Hill
• William Stallings, “Cryptography and Network Security-Principles and
practice”
Ad

More Related Content

What's hot (20)

Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdfUnit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
KanchanPatil34
 
Unit 1_Security Fundamentals_services_mechanisms.pdf
Unit 1_Security Fundamentals_services_mechanisms.pdfUnit 1_Security Fundamentals_services_mechanisms.pdf
Unit 1_Security Fundamentals_services_mechanisms.pdf
KanchanPatil34
 
Unit 1_Transposition Techniques_Ciphers.pdf
Unit 1_Transposition Techniques_Ciphers.pdfUnit 1_Transposition Techniques_Ciphers.pdf
Unit 1_Transposition Techniques_Ciphers.pdf
KanchanPatil34
 
Unit 5_Classification of Cyber Crimes.pdf
Unit 5_Classification of Cyber Crimes.pdfUnit 5_Classification of Cyber Crimes.pdf
Unit 5_Classification of Cyber Crimes.pdf
KanchanPatil34
 
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdfUnit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
KanchanPatil34
 
Unit 5_Social Engineering and Cyberstalking.pdf
Unit 5_Social Engineering and Cyberstalking.pdfUnit 5_Social Engineering and Cyberstalking.pdf
Unit 5_Social Engineering and Cyberstalking.pdf
KanchanPatil34
 
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
Unit 6_DoS and DDoS_SQL Injection_tools.pdfUnit 6_DoS and DDoS_SQL Injection_tools.pdf
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
KanchanPatil34
 
Unit 2 Client-Side Encoding in Web Security
Unit 2 Client-Side Encoding in Web SecurityUnit 2 Client-Side Encoding in Web Security
Unit 2 Client-Side Encoding in Web Security
ChatanBawankar
 
Unit 6_Cyber Laws Indian Act_Digital Signature.pdf
Unit 6_Cyber Laws Indian Act_Digital Signature.pdfUnit 6_Cyber Laws Indian Act_Digital Signature.pdf
Unit 6_Cyber Laws Indian Act_Digital Signature.pdf
KanchanPatil34
 
Cloud presentation
Cloud presentationCloud presentation
Cloud presentation
Sachin Darekar
 
Unit1_Types of MACHINE LEARNING 2020pattern.pdf
Unit1_Types of MACHINE LEARNING 2020pattern.pdfUnit1_Types of MACHINE LEARNING 2020pattern.pdf
Unit1_Types of MACHINE LEARNING 2020pattern.pdf
RAMESHWAR CHINTAMANI
 
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdfUnit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
KanchanPatil34
 
Machine Learning_Unit_II_Regression_notes.pdf
Machine Learning_Unit_II_Regression_notes.pdfMachine Learning_Unit_II_Regression_notes.pdf
Machine Learning_Unit_II_Regression_notes.pdf
RAMESHWAR CHINTAMANI
 
Unit 5_Introduction to Cyber Security.pdf
Unit 5_Introduction to Cyber Security.pdfUnit 5_Introduction to Cyber Security.pdf
Unit 5_Introduction to Cyber Security.pdf
KanchanPatil34
 
Unit 2_Blacklisting & Whitelisting User Input in Python.docx
Unit 2_Blacklisting & Whitelisting User Input in Python.docxUnit 2_Blacklisting & Whitelisting User Input in Python.docx
Unit 2_Blacklisting & Whitelisting User Input in Python.docx
ChatanBawankar
 
Unit 6_keylogger_Spywares_virus_worms.pdf
Unit 6_keylogger_Spywares_virus_worms.pdfUnit 6_keylogger_Spywares_virus_worms.pdf
Unit 6_keylogger_Spywares_virus_worms.pdf
KanchanPatil34
 
Unit 1 Stored Cross-Site Scripting (XSS)
Unit 1 Stored Cross-Site Scripting (XSS)Unit 1 Stored Cross-Site Scripting (XSS)
Unit 1 Stored Cross-Site Scripting (XSS)
ChatanBawankar
 
ML_Unit_IV_Clustering in Machine Learning.pdf
ML_Unit_IV_Clustering in Machine Learning.pdfML_Unit_IV_Clustering in Machine Learning.pdf
ML_Unit_IV_Clustering in Machine Learning.pdf
rameshwarchintamani
 
Unit 1 DVWA (Damn Vulnerable Web Application).docx
Unit 1 DVWA (Damn Vulnerable Web Application).docxUnit 1 DVWA (Damn Vulnerable Web Application).docx
Unit 1 DVWA (Damn Vulnerable Web Application).docx
ChatanBawankar
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
n|u - The Open Security Community
 
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdfUnit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
KanchanPatil34
 
Unit 1_Security Fundamentals_services_mechanisms.pdf
Unit 1_Security Fundamentals_services_mechanisms.pdfUnit 1_Security Fundamentals_services_mechanisms.pdf
Unit 1_Security Fundamentals_services_mechanisms.pdf
KanchanPatil34
 
Unit 1_Transposition Techniques_Ciphers.pdf
Unit 1_Transposition Techniques_Ciphers.pdfUnit 1_Transposition Techniques_Ciphers.pdf
Unit 1_Transposition Techniques_Ciphers.pdf
KanchanPatil34
 
Unit 5_Classification of Cyber Crimes.pdf
Unit 5_Classification of Cyber Crimes.pdfUnit 5_Classification of Cyber Crimes.pdf
Unit 5_Classification of Cyber Crimes.pdf
KanchanPatil34
 
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdfUnit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
KanchanPatil34
 
Unit 5_Social Engineering and Cyberstalking.pdf
Unit 5_Social Engineering and Cyberstalking.pdfUnit 5_Social Engineering and Cyberstalking.pdf
Unit 5_Social Engineering and Cyberstalking.pdf
KanchanPatil34
 
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
Unit 6_DoS and DDoS_SQL Injection_tools.pdfUnit 6_DoS and DDoS_SQL Injection_tools.pdf
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
KanchanPatil34
 
Unit 2 Client-Side Encoding in Web Security
Unit 2 Client-Side Encoding in Web SecurityUnit 2 Client-Side Encoding in Web Security
Unit 2 Client-Side Encoding in Web Security
ChatanBawankar
 
Unit 6_Cyber Laws Indian Act_Digital Signature.pdf
Unit 6_Cyber Laws Indian Act_Digital Signature.pdfUnit 6_Cyber Laws Indian Act_Digital Signature.pdf
Unit 6_Cyber Laws Indian Act_Digital Signature.pdf
KanchanPatil34
 
Unit1_Types of MACHINE LEARNING 2020pattern.pdf
Unit1_Types of MACHINE LEARNING 2020pattern.pdfUnit1_Types of MACHINE LEARNING 2020pattern.pdf
Unit1_Types of MACHINE LEARNING 2020pattern.pdf
RAMESHWAR CHINTAMANI
 
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdfUnit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
KanchanPatil34
 
Machine Learning_Unit_II_Regression_notes.pdf
Machine Learning_Unit_II_Regression_notes.pdfMachine Learning_Unit_II_Regression_notes.pdf
Machine Learning_Unit_II_Regression_notes.pdf
RAMESHWAR CHINTAMANI
 
Unit 5_Introduction to Cyber Security.pdf
Unit 5_Introduction to Cyber Security.pdfUnit 5_Introduction to Cyber Security.pdf
Unit 5_Introduction to Cyber Security.pdf
KanchanPatil34
 
Unit 2_Blacklisting & Whitelisting User Input in Python.docx
Unit 2_Blacklisting & Whitelisting User Input in Python.docxUnit 2_Blacklisting & Whitelisting User Input in Python.docx
Unit 2_Blacklisting & Whitelisting User Input in Python.docx
ChatanBawankar
 
Unit 6_keylogger_Spywares_virus_worms.pdf
Unit 6_keylogger_Spywares_virus_worms.pdfUnit 6_keylogger_Spywares_virus_worms.pdf
Unit 6_keylogger_Spywares_virus_worms.pdf
KanchanPatil34
 
Unit 1 Stored Cross-Site Scripting (XSS)
Unit 1 Stored Cross-Site Scripting (XSS)Unit 1 Stored Cross-Site Scripting (XSS)
Unit 1 Stored Cross-Site Scripting (XSS)
ChatanBawankar
 
ML_Unit_IV_Clustering in Machine Learning.pdf
ML_Unit_IV_Clustering in Machine Learning.pdfML_Unit_IV_Clustering in Machine Learning.pdf
ML_Unit_IV_Clustering in Machine Learning.pdf
rameshwarchintamani
 
Unit 1 DVWA (Damn Vulnerable Web Application).docx
Unit 1 DVWA (Damn Vulnerable Web Application).docxUnit 1 DVWA (Damn Vulnerable Web Application).docx
Unit 1 DVWA (Damn Vulnerable Web Application).docx
ChatanBawankar
 

Similar to Unit 3_Secure Hash Algorithm_SHA_Working.pdf (20)

Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
Karteek Paruchuri
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
CAS
 
cryptography and network security cns.pptx
cryptography and network security cns.pptxcryptography and network security cns.pptx
cryptography and network security cns.pptx
gkumar610
 
Keccak
KeccakKeccak
Keccak
Rajeev Verma
 
Information and data security cryptographic hash functions
Information and data security cryptographic hash functionsInformation and data security cryptographic hash functions
Information and data security cryptographic hash functions
Mazin Alwaaly
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
anuragjagetiya
 
SHA
SHASHA
SHA
SubashiniRathinavel
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
Pawandeep Kaur
 
ENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
ENGG_CSE_III_YEAR_Message_Digest_MD_5.pptENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
ENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
SakethBhargavaRallap
 
UNIT III - Cryptography Notes Asymmetric Crypto.pptx
UNIT III - Cryptography Notes Asymmetric Crypto.pptxUNIT III - Cryptography Notes Asymmetric Crypto.pptx
UNIT III - Cryptography Notes Asymmetric Crypto.pptx
Ramkrishna121962
 
SHA New Revised Version - SHA-512 Syllabus Module 3
SHA New Revised Version - SHA-512 Syllabus Module 3SHA New Revised Version - SHA-512 Syllabus Module 3
SHA New Revised Version - SHA-512 Syllabus Module 3
AnantNimkar1
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
 
Unit II.ppt.............................
Unit II.ppt.............................Unit II.ppt.............................
Unit II.ppt.............................
r47381047
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
Vishakha Agarwal
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
Mazin Alwaaly
 
Message Digest message digest ppttsx.pptx
Message Digest message digest ppttsx.pptxMessage Digest message digest ppttsx.pptx
Message Digest message digest ppttsx.pptx
LaxmipujaBiradar
 
online examination portal project presentation
online examination portal project presentationonline examination portal project presentation
online examination portal project presentation
Shobhit Jain
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Cryptographic Hash Functions in Security.pptx
Cryptographic Hash Functions in Security.pptxCryptographic Hash Functions in Security.pptx
Cryptographic Hash Functions in Security.pptx
VivekanandaGN1
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
CAS
 
cryptography and network security cns.pptx
cryptography and network security cns.pptxcryptography and network security cns.pptx
cryptography and network security cns.pptx
gkumar610
 
Information and data security cryptographic hash functions
Information and data security cryptographic hash functionsInformation and data security cryptographic hash functions
Information and data security cryptographic hash functions
Mazin Alwaaly
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
anuragjagetiya
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
Pawandeep Kaur
 
ENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
ENGG_CSE_III_YEAR_Message_Digest_MD_5.pptENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
ENGG_CSE_III_YEAR_Message_Digest_MD_5.ppt
SakethBhargavaRallap
 
UNIT III - Cryptography Notes Asymmetric Crypto.pptx
UNIT III - Cryptography Notes Asymmetric Crypto.pptxUNIT III - Cryptography Notes Asymmetric Crypto.pptx
UNIT III - Cryptography Notes Asymmetric Crypto.pptx
Ramkrishna121962
 
SHA New Revised Version - SHA-512 Syllabus Module 3
SHA New Revised Version - SHA-512 Syllabus Module 3SHA New Revised Version - SHA-512 Syllabus Module 3
SHA New Revised Version - SHA-512 Syllabus Module 3
AnantNimkar1
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
 
Unit II.ppt.............................
Unit II.ppt.............................Unit II.ppt.............................
Unit II.ppt.............................
r47381047
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
Mazin Alwaaly
 
Message Digest message digest ppttsx.pptx
Message Digest message digest ppttsx.pptxMessage Digest message digest ppttsx.pptx
Message Digest message digest ppttsx.pptx
LaxmipujaBiradar
 
online examination portal project presentation
online examination portal project presentationonline examination portal project presentation
online examination portal project presentation
Shobhit Jain
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Cryptographic Hash Functions in Security.pptx
Cryptographic Hash Functions in Security.pptxCryptographic Hash Functions in Security.pptx
Cryptographic Hash Functions in Security.pptx
VivekanandaGN1
 
Ad

More from KanchanPatil34 (11)

Unit 3_Private Key Management_Protection.pdf
Unit 3_Private Key Management_Protection.pdfUnit 3_Private Key Management_Protection.pdf
Unit 3_Private Key Management_Protection.pdf
KanchanPatil34
 
Unit 3_Digital Certificate_Intro_Types.pdf
Unit 3_Digital Certificate_Intro_Types.pdfUnit 3_Digital Certificate_Intro_Types.pdf
Unit 3_Digital Certificate_Intro_Types.pdf
KanchanPatil34
 
Unit 3_Digital Signature Model Details.pdf
Unit 3_Digital Signature Model Details.pdfUnit 3_Digital Signature Model Details.pdf
Unit 3_Digital Signature Model Details.pdf
KanchanPatil34
 
Unit 1_Stack and Queue using Linked Organization.pdf
Unit 1_Stack and Queue using Linked Organization.pdfUnit 1_Stack and Queue using Linked Organization.pdf
Unit 1_Stack and Queue using Linked Organization.pdf
KanchanPatil34
 
Unit 1_Single Linked List and Double Linked List.pdf
Unit 1_Single Linked List and Double Linked List.pdfUnit 1_Single Linked List and Double Linked List.pdf
Unit 1_Single Linked List and Double Linked List.pdf
KanchanPatil34
 
Unit 2_2 Binary Tree as ADT_General Tree.pdf
Unit 2_2 Binary Tree as ADT_General Tree.pdfUnit 2_2 Binary Tree as ADT_General Tree.pdf
Unit 2_2 Binary Tree as ADT_General Tree.pdf
KanchanPatil34
 
Unit 2_1 Tree.pdf
Unit 2_1 Tree.pdfUnit 2_1 Tree.pdf
Unit 2_1 Tree.pdf
KanchanPatil34
 
Unit 2_3 Binary Tree Traversals.pdf
Unit 2_3 Binary Tree Traversals.pdfUnit 2_3 Binary Tree Traversals.pdf
Unit 2_3 Binary Tree Traversals.pdf
KanchanPatil34
 
Unit 1_SLL and DLL.pdf
Unit 1_SLL and DLL.pdfUnit 1_SLL and DLL.pdf
Unit 1_SLL and DLL.pdf
KanchanPatil34
 
Unit 1_Stack and Queue using Linked Organization.pdf
Unit 1_Stack and Queue using Linked Organization.pdfUnit 1_Stack and Queue using Linked Organization.pdf
Unit 1_Stack and Queue using Linked Organization.pdf
KanchanPatil34
 
PAI Unit 3 Paging in 80386 Microporcessor
PAI Unit 3 Paging in 80386 MicroporcessorPAI Unit 3 Paging in 80386 Microporcessor
PAI Unit 3 Paging in 80386 Microporcessor
KanchanPatil34
 
Unit 3_Private Key Management_Protection.pdf
Unit 3_Private Key Management_Protection.pdfUnit 3_Private Key Management_Protection.pdf
Unit 3_Private Key Management_Protection.pdf
KanchanPatil34
 
Unit 3_Digital Certificate_Intro_Types.pdf
Unit 3_Digital Certificate_Intro_Types.pdfUnit 3_Digital Certificate_Intro_Types.pdf
Unit 3_Digital Certificate_Intro_Types.pdf
KanchanPatil34
 
Unit 3_Digital Signature Model Details.pdf
Unit 3_Digital Signature Model Details.pdfUnit 3_Digital Signature Model Details.pdf
Unit 3_Digital Signature Model Details.pdf
KanchanPatil34
 
Unit 1_Stack and Queue using Linked Organization.pdf
Unit 1_Stack and Queue using Linked Organization.pdfUnit 1_Stack and Queue using Linked Organization.pdf
Unit 1_Stack and Queue using Linked Organization.pdf
KanchanPatil34
 
Unit 1_Single Linked List and Double Linked List.pdf
Unit 1_Single Linked List and Double Linked List.pdfUnit 1_Single Linked List and Double Linked List.pdf
Unit 1_Single Linked List and Double Linked List.pdf
KanchanPatil34
 
Unit 2_2 Binary Tree as ADT_General Tree.pdf
Unit 2_2 Binary Tree as ADT_General Tree.pdfUnit 2_2 Binary Tree as ADT_General Tree.pdf
Unit 2_2 Binary Tree as ADT_General Tree.pdf
KanchanPatil34
 
Unit 2_3 Binary Tree Traversals.pdf
Unit 2_3 Binary Tree Traversals.pdfUnit 2_3 Binary Tree Traversals.pdf
Unit 2_3 Binary Tree Traversals.pdf
KanchanPatil34
 
Unit 1_SLL and DLL.pdf
Unit 1_SLL and DLL.pdfUnit 1_SLL and DLL.pdf
Unit 1_SLL and DLL.pdf
KanchanPatil34
 
Unit 1_Stack and Queue using Linked Organization.pdf
Unit 1_Stack and Queue using Linked Organization.pdfUnit 1_Stack and Queue using Linked Organization.pdf
Unit 1_Stack and Queue using Linked Organization.pdf
KanchanPatil34
 
PAI Unit 3 Paging in 80386 Microporcessor
PAI Unit 3 Paging in 80386 MicroporcessorPAI Unit 3 Paging in 80386 Microporcessor
PAI Unit 3 Paging in 80386 Microporcessor
KanchanPatil34
 
Ad

Recently uploaded (20)

Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...
parmarjuli1412
 
All About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdfAll About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdf
TechSoup
 
Drugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdfDrugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdf
crewot855
 
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptxANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
Mayuri Chavan
 
Rock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian HistoryRock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian History
Virag Sontakke
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and GuestsLDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDM Mia eStudios
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFAMEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
Dr. Nasir Mustafa
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
Search Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo SlidesSearch Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo Slides
Celine George
 
The History of Kashmir Karkota Dynasty NEP.pptx
The History of Kashmir Karkota Dynasty NEP.pptxThe History of Kashmir Karkota Dynasty NEP.pptx
The History of Kashmir Karkota Dynasty NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
Cultivation Practice of Garlic in Nepal.pptx
Cultivation Practice of Garlic in Nepal.pptxCultivation Practice of Garlic in Nepal.pptx
Cultivation Practice of Garlic in Nepal.pptx
UmeshTimilsina1
 
Botany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic ExcellenceBotany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic Excellence
online college homework help
 
Ajanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of HistoryAjanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of History
Virag Sontakke
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18
Celine George
 
Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 
Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...
parmarjuli1412
 
All About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdfAll About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdf
TechSoup
 
Drugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdfDrugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdf
crewot855
 
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptxANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
Mayuri Chavan
 
Rock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian HistoryRock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian History
Virag Sontakke
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and GuestsLDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDM Mia eStudios
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFAMEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
Dr. Nasir Mustafa
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
Search Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo SlidesSearch Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo Slides
Celine George
 
Cultivation Practice of Garlic in Nepal.pptx
Cultivation Practice of Garlic in Nepal.pptxCultivation Practice of Garlic in Nepal.pptx
Cultivation Practice of Garlic in Nepal.pptx
UmeshTimilsina1
 
Botany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic ExcellenceBotany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic Excellence
online college homework help
 
Ajanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of HistoryAjanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of History
Virag Sontakke
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18
Celine George
 
Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 

Unit 3_Secure Hash Algorithm_SHA_Working.pdf

  • 1. Cryptography and Cyber Security [IT311] Sanjivani Rural Education Society’s Sanjivani College of Engineering, Kopargaon-423603 (An Autonomous Institute Affiliated to Savitribai Phule Pune University, Pune) NAAC ‘A’ Grade Accredited, ISO 9001:2015 Certified Department of Information Technology (NBAAccredited) Mrs. Kanchan D. Patil Assistant Professor
  • 2. Unit 3: Message Digest & Key Management • Hash Algorithms: SHA-1, MD5, Key Management: Introduction, Key Management: Generations, Distribution, Updation, Digital Certificate, Digital Signature, Kerberos 5.0. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 3. Secure Hash Algorithm (SHA) • Secure Hash Algorithms (SHA) was developed by National Institute of Standards and Technology (NIST) along with NSA • Published as a Federal Information Processing Standards Publications (FIPS 180 PUBS) in 1993 • A revised version was issued as FIPS PUB 180-1 in 1995 and is referred to as SHA-1 • SHA is a modified version of MD5 • Name of Standard: Secure Hash Signature Standard (SHS) • In 2002 , NIST produced a revised version of the standard, FIPS 180-2 that defined three new versions of SHA as SHA-256, SHA-384, and SHA-512. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 4. Secure Hash Algorithm (SHA) : Purpose • Purpose of SHA is authentication and not the encryption • Verify that received messages come from the alleged source and have not been altered. • Verify the sequence and timing. • Digital Signature is used to combat denial of receipt of a message by either the source or destination. • Impossible to recreate a message given a message digest. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 5. Secure Hash Algorithm (SHA) : Applications • SHA uses one way hash function. The applications are as follows: • Public Key Algorithms • Password Logins • Encryption Key Management • Digital Signatures • Integrity Checking • Virus and Malware Scanning • Authentication • Secure Web Connections (PGP, SSL, SSH, S/MIME) Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 6. Secure Hash Algorithm (SHA) : Variants • MD4 and MD5 by Ron Rivest (1990,1994) • SHA-0, SHA-1 by NSA (1993, 1995) • RIPEMD-160 (1996) • SHA-2 (2002 – 224, 256, 385, 512) • Whirlpool • Tiger • GOST-3411 • SHA-3 • Winner selected from solicitations in 2012 Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 7. Structure of SHA Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 8. Working of SHA • SHA is closely modeled after MD5 • Step 1: Padding • To add padding to the end of the original message in such a way that the length of the message is 64 bits short of a multiple of 512. • Like MD5, the padding always added, even if the message is already 64 bits short of a multiple of 512. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 9. Working of SHA • Step 2: Append length • The length of the message excluding the length of the padding is calculated and appended to the end of the padding as a 64-bit block. • Step 3: Divide the input into 512-bit blocks • The input message is now divided into blocks, of length 512 bits. • These blocks become the input to the message digest processing logic. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 10. Working of SHA • Step 4: Initialize chaining variables • Five chaining variables A through E • In the case of SHA want to produce a message digest of length 160 bits, we need to have five chaining variables here (5 x 32 = 160 bits). • In SHA, the variables A through D have the same values as they had in MD5 • Additionally, E is initialized to Hex C3 D2 E1 F0. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 11. Working of SHA • Step 5: Process Blocks • Step 5.1: • Copy the chaining variables A-E into variables a-e. • The combination of a-e, called as abede will be considered as a single register for storing the temporary intermediate as well as the final results. • Step 5.2: • Now, divide the current 512-bit block into 16 sub-blocks, each consisting of 32 bits. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 12. Working of SHA • Step 5: Process Blocks • Step 5.3: SHA has four rounds, each round consisting of 20 steps. • Each round takes three inputs • Current 512- bit block • Register abcde • A constant K[t] (where t=0 to 79) • It then updates the contents of the register abcde using the SHA algorithm steps. • We have only four constants (in case of MD5-64 constants) defined for K[t], one used in each of the four rounds. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 13. Working of SHA • Step 5: Process Blocks • Step 5.3: We have only four constants (in case of MD5- 64 constants) defined for K[t], one used in each of the four rounds. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 14. Working of SHA • Step 5.4 • SHA consists of four rounds, each round containing 20 iterations. • This makes it a total of 80 iterations. • Mathematically, an iteration consists of the following operations: abcde = (e + Process P+s^5(a)+ W[t] + K[t]), a, s^30 (b), c,d Where, abcde = The register made up of the five variables a, b, c, d and e Process P = The logical operation S^t = Circular-left shift of the 32-bit sub-block by t bits W[t] = A 32-bit derived from the current 32-bit sub block K[t] = One of the five additive constants Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 15. Working of SHA : Single SHA-1 Iteration Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 16. Working of SHA • Step 5.4 : Process P in each SHA-1 round Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 17. Working of SHA • Step 5.4 • The values of W[t] can be calculated as follows: • For the first 16 words of W (ie. t = 0 to 15), the contents of the input message sub-block M[t] become the contents of W[t] straightaway. • That is, the first 16 blocks of the input message M copied to W. • The remaining 64 values of W are derived using the equation: W[t] = s' (W[t-16] XOR W[t-14] XOR W[t-8] XOR W[t-3]) s' indicates a circular-left shift (i.e. rotation) by 1 bit position. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 18. Cryptanalysis and Limitation • Key Premises for Hash Functions: • Impossible to re-create a message given a fingerprint • Collision Free • SHA-1 failure using brute force attack in 2^80 operations Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 19. Comparison of SHA Parameters Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 20. Difference Between MD5 and SHA-1 Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology Sr. No. Points of Discussion MD5 SHA-1 1 Message digest length in bits 128 160 2 Attack to try and find the original message given a message digest Requires 2^128 operations to break in Requires 2^160 operations to break in. more secure 3 Attack to try and find two messages producing the same message digest Requires 2^64 operations to break in Requires 2^80 operations to break in 4 Successful attacks so far Attempts reported so far No reported yet 5 Speed Faster (64 iterations and 128- bit buffer) Slower (80 iterations and 160- bit buffer) 6 Software implementation Simple. Does not need any large programs or complex tables Simple. Does not need any large programs or complex tables
  • 21. References: Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology • Atul Kahate,”Cryptography and Network Security”, second edition, Tata McGraw Hill • William Stallings, “Cryptography and Network Security-Principles and practice”
  翻译: