You are on page 1of 5

S6 IT APPLIED CRYPTOGRAPHY (IT2217)

UNIT - IV

Secure Hash Algorithm (SHA)

 Secure Hash Algorithm (SHA) was designed by National Institute of Standards and
Technology (NIST).
 The Secure Hash Algorithm Version 1 (SHA-1) algorithm accepts a message of
length less than 264 bits as input and produces a 160-bit message digest as output.
 The input is processed in 512-bit blocks.

Processing steps

Figure 1: SHA-1 processing of single 512 bit block

Prepared by: Dr. S. Maria Celestin Vigila / Department of IT / NICHE


S6 IT APPLIED CRYPTOGRAPHY (IT2217)

Prepared by: Dr. S. Maria Celestin Vigila / Department of IT / NICHE


S6 IT APPLIED CRYPTOGRAPHY (IT2217)

Compression function

Figure: Elementary SHA Operation

Prepared by: Dr. S. Maria Celestin Vigila / Department of IT / NICHE


S6 IT APPLIED CRYPTOGRAPHY (IT2217)

Prepared by: Dr. S. Maria Celestin Vigila / Department of IT / NICHE


S6 IT APPLIED CRYPTOGRAPHY (IT2217)

Comparison

MD5 SHA-1
Digest length 128 bits 160 bits
Basic unit of processing 512 bits 512 bits
No of steps 64(4 rounds of 16) 80 (4 rounds of 20)
Primitive logical function 4 4
Additive constants used 64 4
Endianess Little Endian Big Endian

Prepared by: Dr. S. Maria Celestin Vigila / Department of IT / NICHE

You might also like