SlideShare a Scribd company logo
1 of 17
SECURE HASHING TECHNIQUES
By
UdhayyaGethan.M
311511205309
SECURE HASHING
• What ?
• Why ?
• How ?
What is Hashing
• A hash function is any algorithm that maps data of
variable length of data to a fixed length.
• The values returned by the hash functions are called
as hash codes, hash sums, message digest or simply
hashes.
• Hashing mostly takes a string as an input and gives
the output or the hashed values as a numerical value
mostly as an hexadecimal number.
What is so special about Secure
Hashing
• Hash values produced by some hash techniques can
be re hashed.
• That means we can get the original data from the
hash values.
• But hash values of secure hash techniques cant be rehashed.
• That’s why it is called as one way hashing.
Message Digest Functions:
• Checksums  fingerprint of a message
• If message changes, checksum will not match

• Most checksums are good in detecting
accidental changes made to a message
• They are not designed to prevent an adversary
from intentionally changing a message resulting a
message with the same checksum
• Message digests are designed to protect against
this possibility
One-Way Hash Functions:
Example
• M = “Elvis”
• H(M) = (“E” + “L” + “V” + “I” + “S”) mod 26
• H(M) = (5 + 12 + 22 + 9 + 19) mod 26
• H(M) = 67 mod 26
• H(M) = 15
Collision:
Example
• x = “Viva”
• Y = “Vegas”
• H(x) = H(y) = 2
Criteria's for a hash function:
• Given M,
• it is easy to compute h
• Given any h,
• it is hard to find any M such that H(M) = h
• Given M1, it is difficult to find M2
• such that H(M1) = H(M2)
• Functions that satisfy these criteria are called
message digest
• They produce a fixed-length digest (fingerprint)
Secure Hashing Algorithm (SHA) :
• SHA-0
• SHA-1
• SHA-2

1993
1995
2002

• SHA-224, SHA-256, SHA-384, SHA-512
SHA-1
A message
composed
of b bits
9

160-bit
message
digest
Steps for hashing:
•
•
•
•
•

Padding
Dividing
Computing
Initialize
Looping
Example for Padding:
Example :
• M = 01100010 11001010 1001 (20 bits)

• Padding is done by appending to the input
– A single bit, 1
– 427 0s
– A 64-bit integer representing 20

• Pad(M) = 01100010 11001010 10011000 …
00010100
Example :
• Length of M = 500 bits

• Padding is done by appending to the input:
– A single bit, 1
– 459 0s
– A 64-bit integer representing 500

• Length of Pad(M) = 1024 bits
Comparison:
Output
size
(bits)

Internal Block
Max
Word
state size size message size Rounds Operations
(bits)
(bits) size (bits) (bits)

Collisions
found

SHA-0

160

160

512

264 − 1

32

80

+, and, or,
xor, rot

Yes

SHA-1

160

160

512

264 − 1

32

80

+, and, or,
xor, rot

None
(252 attack)

256/224

256

512

264 − 1

32

64

+, and, or,
xor, shr, rot

None

512/384

512

1024

2128 − 1

64

80

+, and, or,
xor, shr, rot

None

SHA-2
Some facts you must know:
• Sha-512 is illegal to use in some countries.
• Because it is tough even to the government to
crack a 512 bit encryption.
• Sha-0 and Sha-1 are very much prone to
collision of data's.
• Md5 hashing technique is no longer secure.
• Md5 has been compromised.
• It has a hash table about the size of 64Gb.
Applications of Secure Hashing:
•
•
•
•
•

Online Banking
Online Shopping
E-Learning
Web servers
………
In short, wherever sensitive data's are
handled and wherever you need to log yourself
in to access data secure hashing is used there.
Thank you

More Related Content

What's hot

Basic explanation to md5 implementation in C
Basic explanation to md5 implementation in CBasic explanation to md5 implementation in C
Basic explanation to md5 implementation in CSourav Punoriyar
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmAjay Karri
 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing FunctionsYusuf Uzun
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms Er Piyush Gupta IN ⊞⌘
 
The SHA Hashing Algorithm
The SHA Hashing AlgorithmThe SHA Hashing Algorithm
The SHA Hashing AlgorithmBob Landstrom
 
Message authentication with md5
Message authentication with md5Message authentication with md5
Message authentication with md5志璿 楊
 
SHA-1 backdooring & exploitation
SHA-1 backdooring & exploitationSHA-1 backdooring & exploitation
SHA-1 backdooring & exploitationAnge Albertini
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 
Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithmsHarry Potter
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).pptGnanalakshmiV
 
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithmBob Landstrom
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash functionChirag Patel
 

What's hot (17)

Basic explanation to md5 implementation in C
Basic explanation to md5 implementation in CBasic explanation to md5 implementation in C
Basic explanation to md5 implementation in C
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing Functions
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
 
Hash function
Hash functionHash function
Hash function
 
The SHA Hashing Algorithm
The SHA Hashing AlgorithmThe SHA Hashing Algorithm
The SHA Hashing Algorithm
 
Message authentication with md5
Message authentication with md5Message authentication with md5
Message authentication with md5
 
SHA-1 backdooring & exploitation
SHA-1 backdooring & exploitationSHA-1 backdooring & exploitation
SHA-1 backdooring & exploitation
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithms
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
 
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 

Viewers also liked

Báo cáo athena
Báo cáo athenaBáo cáo athena
Báo cáo athenaTrung Mai
 
My funlife compensation
My funlife compensationMy funlife compensation
My funlife compensationPeter Parrenas
 
Bao_cao_ttcn
Bao_cao_ttcnBao_cao_ttcn
Bao_cao_ttcnTrung Mai
 
Baocaoathena
BaocaoathenaBaocaoathena
BaocaoathenaTrung Mai
 
DOKUMEN STANDARD KURIKULUM REKABENTUK DAN TEKNOLOGI TAHUN 4
DOKUMEN STANDARD KURIKULUM REKABENTUK DAN TEKNOLOGI TAHUN 4DOKUMEN STANDARD KURIKULUM REKABENTUK DAN TEKNOLOGI TAHUN 4
DOKUMEN STANDARD KURIKULUM REKABENTUK DAN TEKNOLOGI TAHUN 4rekabentukdanteknologi
 
CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM
 CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM
CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEMNexgen Technology
 
Analytical exposition
Analytical expositionAnalytical exposition
Analytical expositionFebri Shandy
 
Rencana pelaksanaan pembelajara
Rencana pelaksanaan pembelajara Rencana pelaksanaan pembelajara
Rencana pelaksanaan pembelajara Febri Shandy
 
Presentation on satellite radio
Presentation on satellite radioPresentation on satellite radio
Presentation on satellite radioPinky Rao
 
intelligent street light system using gsm ppt
intelligent street light system using gsm pptintelligent street light system using gsm ppt
intelligent street light system using gsm pptdarshangowda679
 
Street light ppt
Street light pptStreet light ppt
Street light pptSai Kumar
 
intelligent street light system using gsm Report
intelligent street light system using gsm Reportintelligent street light system using gsm Report
intelligent street light system using gsm Reportdarshangowda679
 
Intelligent Street light monitoring system
Intelligent Street light monitoring systemIntelligent Street light monitoring system
Intelligent Street light monitoring systemvikas mantri
 
Thesis - Voice Control Home Automation
Thesis - Voice Control Home AutomationThesis - Voice Control Home Automation
Thesis - Voice Control Home AutomationAbhishek Neb
 
MODUL PENGAJARAN REKABENTUK DAN TEKNOLOGI TAHUN 4
MODUL PENGAJARAN REKABENTUK DAN TEKNOLOGI TAHUN 4MODUL PENGAJARAN REKABENTUK DAN TEKNOLOGI TAHUN 4
MODUL PENGAJARAN REKABENTUK DAN TEKNOLOGI TAHUN 4rekabentukdanteknologi
 
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSING
CANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSINGCANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSING
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSINGkajikho9
 

Viewers also liked (20)

STANDARD PRESTASI RBT TAHUN 4/2014
STANDARD PRESTASI RBT TAHUN 4/2014STANDARD PRESTASI RBT TAHUN 4/2014
STANDARD PRESTASI RBT TAHUN 4/2014
 
Báo cáo athena
Báo cáo athenaBáo cáo athena
Báo cáo athena
 
My funlife compensation
My funlife compensationMy funlife compensation
My funlife compensation
 
Slidebaocao
SlidebaocaoSlidebaocao
Slidebaocao
 
Bao_cao_ttcn
Bao_cao_ttcnBao_cao_ttcn
Bao_cao_ttcn
 
Baocaoathena
BaocaoathenaBaocaoathena
Baocaoathena
 
DOKUMEN STANDARD KURIKULUM REKABENTUK DAN TEKNOLOGI TAHUN 4
DOKUMEN STANDARD KURIKULUM REKABENTUK DAN TEKNOLOGI TAHUN 4DOKUMEN STANDARD KURIKULUM REKABENTUK DAN TEKNOLOGI TAHUN 4
DOKUMEN STANDARD KURIKULUM REKABENTUK DAN TEKNOLOGI TAHUN 4
 
CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM
 CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM
CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM
 
Analytical exposition
Analytical expositionAnalytical exposition
Analytical exposition
 
Rencana pelaksanaan pembelajara
Rencana pelaksanaan pembelajara Rencana pelaksanaan pembelajara
Rencana pelaksanaan pembelajara
 
Descriptive Text
Descriptive TextDescriptive Text
Descriptive Text
 
Presentation on satellite radio
Presentation on satellite radioPresentation on satellite radio
Presentation on satellite radio
 
intelligent street light system using gsm ppt
intelligent street light system using gsm pptintelligent street light system using gsm ppt
intelligent street light system using gsm ppt
 
Street light ppt
Street light pptStreet light ppt
Street light ppt
 
intelligent street light system using gsm Report
intelligent street light system using gsm Reportintelligent street light system using gsm Report
intelligent street light system using gsm Report
 
Intelligent Street light monitoring system
Intelligent Street light monitoring systemIntelligent Street light monitoring system
Intelligent Street light monitoring system
 
Thesis - Voice Control Home Automation
Thesis - Voice Control Home AutomationThesis - Voice Control Home Automation
Thesis - Voice Control Home Automation
 
Eball presentation 2
Eball presentation 2Eball presentation 2
Eball presentation 2
 
MODUL PENGAJARAN REKABENTUK DAN TEKNOLOGI TAHUN 4
MODUL PENGAJARAN REKABENTUK DAN TEKNOLOGI TAHUN 4MODUL PENGAJARAN REKABENTUK DAN TEKNOLOGI TAHUN 4
MODUL PENGAJARAN REKABENTUK DAN TEKNOLOGI TAHUN 4
 
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSING
CANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSINGCANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSING
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSING
 

Similar to Secure Hashing Techniques - Introduction

Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit ivArthyR3
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit ivArthyR3
 
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORK
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORKUNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORK
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORKjeevasreemurali
 
Message authentication
Message authenticationMessage authentication
Message authenticationCAS
 
Message auth. code Based on Hash Functions.pptx
Message auth. code Based on Hash Functions.pptxMessage auth. code Based on Hash Functions.pptx
Message auth. code Based on Hash Functions.pptxaribariaz507
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmacanuragjagetiya
 
Digital signature
Digital signatureDigital signature
Digital signatureSadhana28
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash functionomarShiekh1
 
Encryption in php
Encryption in phpEncryption in php
Encryption in phpsana mateen
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
MACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block CiphersMACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block CiphersMaitree Patel
 
Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.IOSR Journals
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithmsYoung Alista
 

Similar to Secure Hashing Techniques - Introduction (20)

Cns
CnsCns
Cns
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
 
Ch_07 (1).pptx
Ch_07 (1).pptxCh_07 (1).pptx
Ch_07 (1).pptx
 
Unit-3.pdf
Unit-3.pdfUnit-3.pdf
Unit-3.pdf
 
27-SHA1.ppt
27-SHA1.ppt27-SHA1.ppt
27-SHA1.ppt
 
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORK
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORKUNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORK
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORK
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
lecture13.pdf
lecture13.pdflecture13.pdf
lecture13.pdf
 
Message auth. code Based on Hash Functions.pptx
Message auth. code Based on Hash Functions.pptxMessage auth. code Based on Hash Functions.pptx
Message auth. code Based on Hash Functions.pptx
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
 
Message Authentication: MAC, Hashes
Message Authentication: MAC, HashesMessage Authentication: MAC, Hashes
Message Authentication: MAC, Hashes
 
Sha
ShaSha
Sha
 
Encryption in php
Encryption in phpEncryption in php
Encryption in php
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
MACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block CiphersMACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block Ciphers
 
Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 

Recently uploaded

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Recently uploaded (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Secure Hashing Techniques - Introduction

  • 2. SECURE HASHING • What ? • Why ? • How ?
  • 3. What is Hashing • A hash function is any algorithm that maps data of variable length of data to a fixed length. • The values returned by the hash functions are called as hash codes, hash sums, message digest or simply hashes. • Hashing mostly takes a string as an input and gives the output or the hashed values as a numerical value mostly as an hexadecimal number.
  • 4. What is so special about Secure Hashing • Hash values produced by some hash techniques can be re hashed. • That means we can get the original data from the hash values. • But hash values of secure hash techniques cant be rehashed. • That’s why it is called as one way hashing.
  • 5. Message Digest Functions: • Checksums  fingerprint of a message • If message changes, checksum will not match • Most checksums are good in detecting accidental changes made to a message • They are not designed to prevent an adversary from intentionally changing a message resulting a message with the same checksum • Message digests are designed to protect against this possibility
  • 6. One-Way Hash Functions: Example • M = “Elvis” • H(M) = (“E” + “L” + “V” + “I” + “S”) mod 26 • H(M) = (5 + 12 + 22 + 9 + 19) mod 26 • H(M) = 67 mod 26 • H(M) = 15
  • 7. Collision: Example • x = “Viva” • Y = “Vegas” • H(x) = H(y) = 2
  • 8. Criteria's for a hash function: • Given M, • it is easy to compute h • Given any h, • it is hard to find any M such that H(M) = h • Given M1, it is difficult to find M2 • such that H(M1) = H(M2) • Functions that satisfy these criteria are called message digest • They produce a fixed-length digest (fingerprint)
  • 9. Secure Hashing Algorithm (SHA) : • SHA-0 • SHA-1 • SHA-2 1993 1995 2002 • SHA-224, SHA-256, SHA-384, SHA-512 SHA-1 A message composed of b bits 9 160-bit message digest
  • 12. Example : • M = 01100010 11001010 1001 (20 bits) • Padding is done by appending to the input – A single bit, 1 – 427 0s – A 64-bit integer representing 20 • Pad(M) = 01100010 11001010 10011000 … 00010100
  • 13. Example : • Length of M = 500 bits • Padding is done by appending to the input: – A single bit, 1 – 459 0s – A 64-bit integer representing 500 • Length of Pad(M) = 1024 bits
  • 14. Comparison: Output size (bits) Internal Block Max Word state size size message size Rounds Operations (bits) (bits) size (bits) (bits) Collisions found SHA-0 160 160 512 264 − 1 32 80 +, and, or, xor, rot Yes SHA-1 160 160 512 264 − 1 32 80 +, and, or, xor, rot None (252 attack) 256/224 256 512 264 − 1 32 64 +, and, or, xor, shr, rot None 512/384 512 1024 2128 − 1 64 80 +, and, or, xor, shr, rot None SHA-2
  • 15. Some facts you must know: • Sha-512 is illegal to use in some countries. • Because it is tough even to the government to crack a 512 bit encryption. • Sha-0 and Sha-1 are very much prone to collision of data's. • Md5 hashing technique is no longer secure. • Md5 has been compromised. • It has a hash table about the size of 64Gb.
  • 16. Applications of Secure Hashing: • • • • • Online Banking Online Shopping E-Learning Web servers ……… In short, wherever sensitive data's are handled and wherever you need to log yourself in to access data secure hashing is used there.