19-Secure Hash Function (SHA) - 27!02!2025
19-Secure Hash Function (SHA) - 27!02!2025
Dr. Somasundaram S K
Assistant Professor Senior Grade 2
School of Computer Science and
Engineering,
Vellore Institute of Technology,
Vellore – 632 014
Phone No: +91 9843665115
Mail ID: [email protected]
Location: PRP Block – 218D
Secure Hash Algorithm
future applications
Revised Secure Hash Standard
• NIST issued revision FIPS 180-2 in 2002
Pad the original length of the message for 128 bits at the
end
Message_Length = 24 bits
Hexadecimal value of 24 is 18
Message length represented in 128 bits in hexa decimal is
Exercise
• How many bits you will pad for input message length of
2348 bits?
SHA-512
Logic
Introduces a great deal of redundancy and interdependence into the message blocks
that are compressed, which complicates the task of finding a different message block
that maps to the same compression function output
Creation of 80-word Input Sequence for
SHA-512 Processing of Single Block
• It remains to indicate how the 64-bit word values Wt are derived
from the 1024-bit message. The first 16 values of Wt are taken
directly from the 16 words of the current block. The remaining
values are defined as:
SHA-512 Processing of a Single
1024-Bit Block
SHA-512 Constants