sha algorithm explanation ppt
#1

Will you please provide Complete explanation for SHA algorithm and it's types.and comparision between those Sha-0,Sha-1,sha-2 & sha-3.
Reply
#2

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST. SHA-1 produces a 160-bit (20-byte) hash value known as a message digest. A SHA-1 hash value is typically rendered as a hexadecimal number, 40 digits long.

SHA-1 is no longer considered secure against well-funded opponents. In 2005, cryptanalysts found attacks on SHA-1 suggesting that the algorithm might not be secure enough for ongoing use, and since 2010 many organizations have recommended its replacement by SHA-2 or SHA-3. Microsoft, Google and Mozilla have all announced that their respective browsers will stop accepting SHA-1 SSL certificates by 2017.



How Hash Algorithms Work
This page was written for people who really want to know exactly how hash algorithms work. The following is a complete detailed step-by-step walk through of exactly how hash algorithms work. This is written mainly for people with very good knowledge about computers, encryption, and logical operators. I did try to write it so that everyone could understand it, but you might find it boring/dry/confusing if you aren't really interested in how hash algorithms work and know a fair amount already.

What is a 'Hash Algorithm'?
A hash function is simply an algorithm that takes a string of any length and reduces it to a unique fixed length string.

What are hash algorithms used for?
Hashes are used to ensure data and message integrity, password validity, and are the basis of many other cryptographic systems.

Important properties:
Each hash is unique but always repeatable
The word 'cat' will hash to something that no other word hashes too, but it will always hash to the same thing.

The function is 'one way'.
If you are given the value of what 'cat' hashes too but you didn't know what made it, you would never be able to find out that 'cat' was the original word.

There are many different hash functions but the one I will be concentrating on today is called the Secure Hash Algorithm 1 or SHA-1.

Example:
'test' => SHA-1 => 'a94a8fe5ccb19ba61c4c0873d391e987982fbbd3'
Every time that anyone anywhere runs the word 'test' through the SHA-1 function, they should always get: a94a8fe5ccb19ba61c4c0873d391e987982fbbd3.
Also, it should be computationally infeasible to find any other word which also hashes to a94a8fe5ccb19ba61c4c0873d391e987982fbbd3.
Finally, if I were to give you only 'a94a8fe5ccb19ba61c4c0873d391e987982fbbd3' and tell you that it came from the SHA-1, you should have absolutely no way to figure out what was put into the function to create that.

Almost all computer passwords are stored in this fashion (though hopefully not with SHA-1). When you create a password the computer runs it through a hash function then stores only the result. Because the function is 'one-way', even if someone were to gain access to the file that stores that output they shouldn't be able to figure out your password.
When the computer prompts you to enter your password to log in it will simply hash whatever you give it and then compare it to the stored hash of your password.
This is often why passwords must be reset. Because the computer never stores your actual 'plain text' password and only a fingerprint of it, there is no way for it to tell you what your password was.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: sha cha chicken, sha seminarhotel am, design and implementation of sha 1 using vhdl, na babar sha bumper, advantages of sha 1 algorithm ppt, blowfish algorithm explanation ppt, well come sha,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  algorithm of railway reservation system 0 667 02-10-2018, 10:50 PM
Last Post: Guest
  md5 algorithm advantages and disadvantages 0 593 18-07-2018, 02:52 PM
Last Post: Guest
Thumbs Up online detection and prevention of phishing attacks using linkguard algorithm 1 670 12-07-2018, 02:30 PM
Last Post: BhavyaJyothi
  pegasis algorithm code in matlab 1 592 29-05-2018, 10:53 PM
Last Post: Guest
  source code of bellman ford algorithm in opengl 0 652 24-05-2018, 12:47 AM
Last Post: Guest
  project report bellman ford algorithm using opengl 0 668 17-05-2018, 01:39 PM
Last Post: Guest
  kruskal algorithm using opengl 0 514 11-05-2018, 11:00 AM
Last Post: Guest
  birch algorithm in java code 0 519 08-05-2018, 08:38 PM
Last Post: Guest
  matlab code for earliest deadline first scheduling algorithm 0 527 28-04-2018, 03:00 AM
Last Post: Guest
  birch clustering algorithm source code 0 407 23-04-2018, 05:42 PM
Last Post: Guest

Forum Jump: