0
Upcoming SlideShare
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Standard text messaging rates apply

# Cryptography Ashik

702

Published on

List cryptographic hash algorithms and list their applications. MD5 hash algorithm Description.

List cryptographic hash algorithms and list their applications. MD5 hash algorithm Description.

Published in: Education, Technology
0 Likes
Statistics
Notes
• Full Name
Comment goes here.

Are you sure you want to Yes No
• Be the first to comment

• Be the first to like this

Views
Total Views
702
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
25
0
Likes
0
Embeds 0
No embeds

No notes for slide

### Transcript

• 1. Welcome
Presentation on
Cryptography & Information Security
• 2. Topic
5
List cryptographic hash algorithms and list their applications. Discuss MD5 hash algorithm or any other hash algorithm in detail.
Submitted By:
M.Sc. in CSE
ID: 092-25-127
DIU
ashik.email@gmail.com
http://ashikiqbal.blogspot.com
• 3. Cryptographic Hash Algorithms
• 4. List of Hash Algorithms
• 5. Applications of Hash Algorithms
Used Alone
File integrity verification
Public key fingerprint
Combined with encryption functions
• 6. MD5
Message-Digest algorithm 5
• 7. MD5
Designed by Ronald Rivest in 1991 and replaces an earlier hash function MD4
MD5 is a widely used cryptographic hash function
128-bit hash function
Uses 512 bit blocks
Uses 128-bit keys or states
The 128-bit key is split into 4 sub-keys of 32 bits each
Four rounds are used to produce the hash
In each round addition, XOR, AND, OR, rotation are used
• 8. MD5 Example
hello
5d41402abc4b2a76b9719d911017c592
• 9. MD5 Algorithms
2. Append length (64bits)
(to 448 mod 512)
3. Initialize MD buffer
Word A = 01 23 45 67
Word B = 89 AB CD EF
Word C = FE DC BA 98
Word D = 76 54 32 10
• 10. MD5 Algorithms
F(X,Y,Z) = (X ∧ Y) ∨ (¬X ∧ Z)
G(X,Y,Z) = (X ∧ Z) ∨ (Y ∧ ¬Z)
H(X,Y,Z) = X ⊕ Y ⊕ Z
I(X,Y,Z) = Y ⊕ (X ∨ ¬Z)
Round 0: Steps 0 to 15
Round 1: Steps 16 to 31
Round 2: Steps 32 to 47
16 steps
Round 4: Steps 47 to 63
X[k] = M [q*16+k] (32 bit)
Constructed from sine function
• 11. MD5 Applications
MD5 has been employed in a wide variety of security applications and is also commonly used to check the integrity of files
Used in the software world to provide some assurance that a transferred file has arrived intact
Unix-based operating systems include MD5 sum utilities in their distribution packages
MD5 can provide error-checking functionality