SlideShare a Scribd company logo
1 of 12
Download to read offline
The SHA Hashing Algorithm
Data Protection in the Data Center
Why are we bothering with cryptography when talking about data centers?
If we believe that the data center is a treasure chest for our business’ most important
assets, then we have to realize the importance and the role of cryptography for:
a)  Maintaining the integrity of data
b)  Protecting data privacy, especially with new regulatory constraints
- In Motion, In Use, and At Rest
Hashing Algorithms and Cryptography
Hashing algorithms (or hashing functions) are not technically encryption algorithms
at all.
They are though, an essential component in cryptography along with symmetric
encryption and asymmetric encryption algorithms.
Hashing algorithms are also known as a Message Digests.
Message Digest: Data Fingerprint
Message-Digest algorithms are mathematical functions that transform a data string
of arbitrary length into a new string of data of fixed length (In this case, there are
options for the length of the digest, but it’s always fixed for each algorithm).
The output of the algorithm can be thought of as a “fingerprint” of the input data.
That is, it is a unique representation of the input data.
Important Points:
1)  It should be impossible to have two different versions of the input data that
returns the same output data.
2)  It cannot be reversed! It should be impossible to produce the input value even if
you know the output value. It’s a one-way function!
The Secure Hash Algorithm (SHA)
The SHA hashing algorithm is actually a family of algorithms: SHA-0, SHA-1, SHA-2, SHA-3.
Created through the US Government’s “Capstone” project, driven by NIST and the NSA.
SHA-0 was quickly withdrawn after release and replaced by SHA-1
SHA-1 produces a 160-bit hash value.
In 2015, SHA-1 was revealed to be vulnerable to collisions at a cost of only $75-120K
using EC2 nodes, putting it within reach of criminal syndicates.
SHA-2
The US Government recommends SHA-2 as a replacement for SHA-1.
SHA-2 is a family of hash functions in its own way !
Message Digest lengths of 224, 256, 384, and 512 bits are available.
How does it work then?
SHA works like all hashing functions work, by applying a compression function to
the input data.
SHA works in block mode, first separating the data into words, and then grouping
the words into blocks. The words are 32-bit strings converted to hexadecimal,
grouped together as 16 words to make up a 512-bit block. The message can be
padded with zeros and an integer describing the original message length is
appended.
Once formatted for processing, the actual hash is generated. The 512-bit blocks
are taken in order, processing them algorithmically through a series of buffers.
After done for all blocks, the entire message is now represented by the fixed
length string of the hash.
Of course- SHA-3
And if you’re wondering, of course there is also a SHA-3.
NIST created a competition in 2006 to create a new hashing function standard.
This was not to replace SHA-2, but as an alternative and dissimilar cryptographic
hashing function.
SHA-3 has been an official NIST hashing standard since 2015. A notable
“dissimilarity” with SHA-3 is its use of a sponge function, which is unlike earlier
SHA algorithms.
Which SHA should I use?
So when do you use which SHA algorithm? Well the Federal Information Processing
Standard (FIPS) recommends the following. Use SHA-1, SHA-224, and SHA-256 for
messages less than 264 bits in length. SHA-384 and SHA-512 are recommended for
messages less than 2128 bits in length.
The value of digital fingerprints is straightforward, and there are many choices of
hashing algorithms to use. When applying a hashing algorithm, one may encounter
tradeoffs such as collision resistance and also processing speed.
Hashing Algorithm Speed Comparison
Hashing algorithms consume data processing resources of one form or another.
This chart comes from Javamex showing the differences in processing time for the
various hashing algorithms.
Applications of SHA Hashing Algorithms
Applications for SHA-1 and SHA-2 are many for demonstrating message integrity,
including password storage, file verification, and digital signatures. They are used
in common Internet applications such as TLS and SSL, PGP, SSH, S/MIME and IPsec.
SHA-2 is widely used for authentication of software packages and digital media.
SHA-256 and SHA-512 have been proposed for use in DNSSEC and also for Unix and
Linux password hashing. SHA-256 is used for Bitcoin transaction verification.
boblandstrom.com
@DataCenterBob
RUINEDFORORDINARY...

More Related Content

What's hot

Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
James Wong
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
koolkampus
 

What's hot (20)

SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Sha3
Sha3Sha3
Sha3
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Sha
ShaSha
Sha
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 
Ch03
Ch03Ch03
Ch03
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
SHA 1 Algorithm
SHA 1 AlgorithmSHA 1 Algorithm
SHA 1 Algorithm
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Hash function
Hash function Hash function
Hash function
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
 

Viewers also liked

Fota Delta Size Reduction Using FIle Similarity Algorithms
Fota Delta Size Reduction Using FIle Similarity AlgorithmsFota Delta Size Reduction Using FIle Similarity Algorithms
Fota Delta Size Reduction Using FIle Similarity Algorithms
Shivansh Gaur
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in Cryptography
Basudev Saha
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 

Viewers also liked (20)

Fungsi Hash & Algoritma SHA-256 - Presentation
Fungsi Hash & Algoritma SHA-256 - PresentationFungsi Hash & Algoritma SHA-256 - Presentation
Fungsi Hash & Algoritma SHA-256 - Presentation
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
SHA-3, Keccak & Sponge function
SHA-3, Keccak & Sponge functionSHA-3, Keccak & Sponge function
SHA-3, Keccak & Sponge function
 
Keccak
KeccakKeccak
Keccak
 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
 
Tiny encryption algorithm
Tiny encryption algorithmTiny encryption algorithm
Tiny encryption algorithm
 
Fota Delta Size Reduction Using FIle Similarity Algorithms
Fota Delta Size Reduction Using FIle Similarity AlgorithmsFota Delta Size Reduction Using FIle Similarity Algorithms
Fota Delta Size Reduction Using FIle Similarity Algorithms
 
Fungsi Hash & Algoritma SHA-256
Fungsi Hash & Algoritma SHA-256Fungsi Hash & Algoritma SHA-256
Fungsi Hash & Algoritma SHA-256
 
Ch13
Ch13Ch13
Ch13
 
Ch12
Ch12Ch12
Ch12
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
Hashing
HashingHashing
Hashing
 
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Hash Functions, the MD5 Algorithm and the Future (SHA-3)Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital Signatures
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in Cryptography
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 

Similar to The SHA Hashing Algorithm

01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
GnanalakshmiV
 

Similar to The SHA Hashing Algorithm (20)

Hashing
HashingHashing
Hashing
 
A Survey of Password Attacks and Safe Hashing Algorithms
A Survey of Password Attacks and Safe Hashing AlgorithmsA Survey of Password Attacks and Safe Hashing Algorithms
A Survey of Password Attacks and Safe Hashing Algorithms
 
Hashes
HashesHashes
Hashes
 
ch12.ppt
ch12.pptch12.ppt
ch12.ppt
 
HMAC&CMAC.ppt
HMAC&CMAC.pptHMAC&CMAC.ppt
HMAC&CMAC.ppt
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
 
Cryprography Assignment
Cryprography AssignmentCryprography Assignment
Cryprography Assignment
 
Whitepaper on new research on message digest and hash techniques
Whitepaper on new research on message digest and hash techniques Whitepaper on new research on message digest and hash techniques
Whitepaper on new research on message digest and hash techniques
 
Security in Manets using Cryptography Algorithms
Security in Manets using Cryptography AlgorithmsSecurity in Manets using Cryptography Algorithms
Security in Manets using Cryptography Algorithms
 
HASH FUNCTIONS.pdf
HASH FUNCTIONS.pdfHASH FUNCTIONS.pdf
HASH FUNCTIONS.pdf
 
Hashing
HashingHashing
Hashing
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
 
Hash_Crypto.ppt
Hash_Crypto.pptHash_Crypto.ppt
Hash_Crypto.ppt
 
SHA-1 Collision Found - eSCan
SHA-1 Collision Found - eSCanSHA-1 Collision Found - eSCan
SHA-1 Collision Found - eSCan
 
Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

The SHA Hashing Algorithm

  • 1. The SHA Hashing Algorithm
  • 2. Data Protection in the Data Center Why are we bothering with cryptography when talking about data centers? If we believe that the data center is a treasure chest for our business’ most important assets, then we have to realize the importance and the role of cryptography for: a)  Maintaining the integrity of data b)  Protecting data privacy, especially with new regulatory constraints - In Motion, In Use, and At Rest
  • 3. Hashing Algorithms and Cryptography Hashing algorithms (or hashing functions) are not technically encryption algorithms at all. They are though, an essential component in cryptography along with symmetric encryption and asymmetric encryption algorithms. Hashing algorithms are also known as a Message Digests.
  • 4. Message Digest: Data Fingerprint Message-Digest algorithms are mathematical functions that transform a data string of arbitrary length into a new string of data of fixed length (In this case, there are options for the length of the digest, but it’s always fixed for each algorithm). The output of the algorithm can be thought of as a “fingerprint” of the input data. That is, it is a unique representation of the input data. Important Points: 1)  It should be impossible to have two different versions of the input data that returns the same output data. 2)  It cannot be reversed! It should be impossible to produce the input value even if you know the output value. It’s a one-way function!
  • 5. The Secure Hash Algorithm (SHA) The SHA hashing algorithm is actually a family of algorithms: SHA-0, SHA-1, SHA-2, SHA-3. Created through the US Government’s “Capstone” project, driven by NIST and the NSA. SHA-0 was quickly withdrawn after release and replaced by SHA-1 SHA-1 produces a 160-bit hash value. In 2015, SHA-1 was revealed to be vulnerable to collisions at a cost of only $75-120K using EC2 nodes, putting it within reach of criminal syndicates.
  • 6. SHA-2 The US Government recommends SHA-2 as a replacement for SHA-1. SHA-2 is a family of hash functions in its own way ! Message Digest lengths of 224, 256, 384, and 512 bits are available.
  • 7. How does it work then? SHA works like all hashing functions work, by applying a compression function to the input data. SHA works in block mode, first separating the data into words, and then grouping the words into blocks. The words are 32-bit strings converted to hexadecimal, grouped together as 16 words to make up a 512-bit block. The message can be padded with zeros and an integer describing the original message length is appended. Once formatted for processing, the actual hash is generated. The 512-bit blocks are taken in order, processing them algorithmically through a series of buffers. After done for all blocks, the entire message is now represented by the fixed length string of the hash.
  • 8. Of course- SHA-3 And if you’re wondering, of course there is also a SHA-3. NIST created a competition in 2006 to create a new hashing function standard. This was not to replace SHA-2, but as an alternative and dissimilar cryptographic hashing function. SHA-3 has been an official NIST hashing standard since 2015. A notable “dissimilarity” with SHA-3 is its use of a sponge function, which is unlike earlier SHA algorithms.
  • 9. Which SHA should I use? So when do you use which SHA algorithm? Well the Federal Information Processing Standard (FIPS) recommends the following. Use SHA-1, SHA-224, and SHA-256 for messages less than 264 bits in length. SHA-384 and SHA-512 are recommended for messages less than 2128 bits in length. The value of digital fingerprints is straightforward, and there are many choices of hashing algorithms to use. When applying a hashing algorithm, one may encounter tradeoffs such as collision resistance and also processing speed.
  • 10. Hashing Algorithm Speed Comparison Hashing algorithms consume data processing resources of one form or another. This chart comes from Javamex showing the differences in processing time for the various hashing algorithms.
  • 11. Applications of SHA Hashing Algorithms Applications for SHA-1 and SHA-2 are many for demonstrating message integrity, including password storage, file verification, and digital signatures. They are used in common Internet applications such as TLS and SSL, PGP, SSH, S/MIME and IPsec. SHA-2 is widely used for authentication of software packages and digital media. SHA-256 and SHA-512 have been proposed for use in DNSSEC and also for Unix and Linux password hashing. SHA-256 is used for Bitcoin transaction verification.