0% found this document useful (0 votes)
35 views

Secure Hash Algorithm Ch12

This document summarizes hash and message authentication code (MAC) algorithms. It discusses how hash functions condense arbitrary messages into fixed-size outputs and how MACs generate authenticators to authenticate messages. It then focuses on specific hash standards from NIST, including the original Secure Hash Algorithm (SHA-1) and its revised versions SHA-256, SHA-384, and SHA-512, which have increased security. The core of these algorithms is described as an iterative compression function that processes message blocks through rounds, updating a buffer using round constants.

Uploaded by

Nistha Katara
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

Secure Hash Algorithm Ch12

This document summarizes hash and message authentication code (MAC) algorithms. It discusses how hash functions condense arbitrary messages into fixed-size outputs and how MACs generate authenticators to authenticate messages. It then focuses on specific hash standards from NIST, including the original Secure Hash Algorithm (SHA-1) and its revised versions SHA-256, SHA-384, and SHA-512, which have increased security. The core of these algorithms is described as an iterative compression function that processes message blocks through rounds, updating a buffer using round constants.

Uploaded by

Nistha Katara
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 10

Hash and MAC Algorithms

Hash and MAC Algorithms


Hash

Functions

condense arbitrary size message to fixed size by processing message in blocks through some compression function either custom or block cipher based

Message

Authentication Code (MAC)

fixed sized authenticator for some message to provide authentication for message by using block cipher mode or hash function

Hash Algorithm Structure

Secure Hash Algorithm

SHA originally designed by NIST & NSA in 1993 was revised in 1995 as SHA-1 US standard for use with DSA signature scheme

standard is FIPS 180-1 1995, also Internet RFC3174 nb. the algorithm is SHA, the standard is SHS

based on design of MD4 with key differences produces 160-bit hash values recent 2005 results on security of SHA-1 have raised concerns on its use in future applications

Revised Secure Hash Standard


NIST

issued revision FIPS 180-2 in 2002 adds 3 additional versions of SHA


SHA-256, SHA-384, SHA-512
designed

for compatibility with increased security provided by the AES cipher structure & detail is similar to SHA-1 hence analysis should be similar but security levels are rather higher

SHA-512 Overview

SHA-512 Compression Function


heart

of the algorithm processing message in 1024-bit blocks consists of 80 rounds


updating a 512-bit buffer using a 64-bit value Wt derived from the current message block and a round constant based on cube root of first 80 prime numbers

SHA-512 Round Function

SHA-512 Round Function

Summary
have

considered:

some current hash algorithms


SHA-512 & Whirlpool

HMAC authentication using hash function CMAC authentication using a block cipher

You might also like