A. D. Patel Institute Of Technology
Information and Network Security [2170709] : A. Y. 2019-20
Secure Hash Algorithm (SHA)
Prepared By :
Dhruv V. Shah (160010116053)
B.E. (IT) Sem - VII
Guided By :
Dr. Sudhir Vegad
(Head Of CP Dept. , ADIT)
Department Of Information Technology
A.D. Patel Institute Of Technology (ADIT)
New Vallabh Vidyanagar , Anand , Gujarat
1
Outline
Introduction
Purpose
Working and Message Content Diagram
Pseudo code Steps
Applications
2
Introduction
What is SHA ?
 SHA stands for Secure Hash Algorithm.
 It was developed by National Institute Of Standards and
Technology(NIST) along with National Security Agency(NSA).
 In 1993, SHA was established as federal information processing
standard.
 It has different versions :
 SHA – 0
 SHA – 1
 SHA – 2
 SHA - 3
3
Purpose
4
 Key Purpose : Authentication not Encryption.
 Authentication Requirements :
Masquerade - insertion of message from fraudulent sources.
Content Modification – changing content of message.
Sequence Modification – insertion, deletion and reordering sequence.
Timing Modification – replaying valid sessions.
Working Diagram
5
Message Content Diagram
6
Pseudo Code Steps
7
Following steps are carried out to apply SHA algorithm to a given message :-
1. Padding of Bits – 128 short of a multiple of 1024.
2. Append Length.
3. Divide the input into 1024-bit blocks.
4. Initialize Chaining Variables.
A= 6A09E667F3BCC908 B= BB67AE8584CAA73B
C= 3C6EF372FE94F82B D= A54FF53A5F1D36F1
E= 510E527FADE6821D F= 9B05688C2B3E6C1F
G= 1F83D9ABFB41BD6B H= 5BE0CD19137E2179
5. Process Blocks
i. Copy the variables A-H to a-h.
ii. Divide the 1024-bit block into 16 sub blocks of 64-bit each.
8
Applications
 Public Key Algorithms
– Password Logins
– Encryption Key Management
– Digital Signatures
 Integrity Checking
– Virus and Malware Scanning
 Authentication
– Secure Web Connections
 (PGP, SSL, SSH, S/MIME)
9

Secure Hash Algorithm (SHA)

  • 1.
    A. D. PatelInstitute Of Technology Information and Network Security [2170709] : A. Y. 2019-20 Secure Hash Algorithm (SHA) Prepared By : Dhruv V. Shah (160010116053) B.E. (IT) Sem - VII Guided By : Dr. Sudhir Vegad (Head Of CP Dept. , ADIT) Department Of Information Technology A.D. Patel Institute Of Technology (ADIT) New Vallabh Vidyanagar , Anand , Gujarat 1
  • 2.
    Outline Introduction Purpose Working and MessageContent Diagram Pseudo code Steps Applications 2
  • 3.
    Introduction What is SHA?  SHA stands for Secure Hash Algorithm.  It was developed by National Institute Of Standards and Technology(NIST) along with National Security Agency(NSA).  In 1993, SHA was established as federal information processing standard.  It has different versions :  SHA – 0  SHA – 1  SHA – 2  SHA - 3 3
  • 4.
    Purpose 4  Key Purpose: Authentication not Encryption.  Authentication Requirements : Masquerade - insertion of message from fraudulent sources. Content Modification – changing content of message. Sequence Modification – insertion, deletion and reordering sequence. Timing Modification – replaying valid sessions.
  • 5.
  • 6.
  • 7.
    Pseudo Code Steps 7 Followingsteps are carried out to apply SHA algorithm to a given message :- 1. Padding of Bits – 128 short of a multiple of 1024. 2. Append Length. 3. Divide the input into 1024-bit blocks. 4. Initialize Chaining Variables. A= 6A09E667F3BCC908 B= BB67AE8584CAA73B C= 3C6EF372FE94F82B D= A54FF53A5F1D36F1 E= 510E527FADE6821D F= 9B05688C2B3E6C1F G= 1F83D9ABFB41BD6B H= 5BE0CD19137E2179 5. Process Blocks i. Copy the variables A-H to a-h. ii. Divide the 1024-bit block into 16 sub blocks of 64-bit each.
  • 8.
    8 Applications  Public KeyAlgorithms – Password Logins – Encryption Key Management – Digital Signatures  Integrity Checking – Virus and Malware Scanning  Authentication – Secure Web Connections  (PGP, SSL, SSH, S/MIME)
  • 9.