SlideShare a Scribd company logo
4
Most read
7
Most read
10
Most read
The SHA Hashing Algorithm
Data Protection in the Data Center
Why are we bothering with cryptography when talking about data centers?
If we believe that the data center is a treasure chest for our business’ most important
assets, then we have to realize the importance and the role of cryptography for:
a)  Maintaining the integrity of data
b)  Protecting data privacy, especially with new regulatory constraints
- In Motion, In Use, and At Rest
Hashing Algorithms and Cryptography
Hashing algorithms (or hashing functions) are not technically encryption algorithms
at all.
They are though, an essential component in cryptography along with symmetric
encryption and asymmetric encryption algorithms.
Hashing algorithms are also known as a Message Digests.
Message Digest: Data Fingerprint
Message-Digest algorithms are mathematical functions that transform a data string
of arbitrary length into a new string of data of fixed length (In this case, there are
options for the length of the digest, but it’s always fixed for each algorithm).
The output of the algorithm can be thought of as a “fingerprint” of the input data.
That is, it is a unique representation of the input data.
Important Points:
1)  It should be impossible to have two different versions of the input data that
returns the same output data.
2)  It cannot be reversed! It should be impossible to produce the input value even if
you know the output value. It’s a one-way function!
The Secure Hash Algorithm (SHA)
The SHA hashing algorithm is actually a family of algorithms: SHA-0, SHA-1, SHA-2, SHA-3.
Created through the US Government’s “Capstone” project, driven by NIST and the NSA.
SHA-0 was quickly withdrawn after release and replaced by SHA-1
SHA-1 produces a 160-bit hash value.
In 2015, SHA-1 was revealed to be vulnerable to collisions at a cost of only $75-120K
using EC2 nodes, putting it within reach of criminal syndicates.
SHA-2
The US Government recommends SHA-2 as a replacement for SHA-1.
SHA-2 is a family of hash functions in its own way !
Message Digest lengths of 224, 256, 384, and 512 bits are available.
How does it work then?
SHA works like all hashing functions work, by applying a compression function to
the input data.
SHA works in block mode, first separating the data into words, and then grouping
the words into blocks. The words are 32-bit strings converted to hexadecimal,
grouped together as 16 words to make up a 512-bit block. The message can be
padded with zeros and an integer describing the original message length is
appended.
Once formatted for processing, the actual hash is generated. The 512-bit blocks
are taken in order, processing them algorithmically through a series of buffers.
After done for all blocks, the entire message is now represented by the fixed
length string of the hash.
Of course- SHA-3
And if you’re wondering, of course there is also a SHA-3.
NIST created a competition in 2006 to create a new hashing function standard.
This was not to replace SHA-2, but as an alternative and dissimilar cryptographic
hashing function.
SHA-3 has been an official NIST hashing standard since 2015. A notable
“dissimilarity” with SHA-3 is its use of a sponge function, which is unlike earlier
SHA algorithms.
Which SHA should I use?
So when do you use which SHA algorithm? Well the Federal Information Processing
Standard (FIPS) recommends the following. Use SHA-1, SHA-224, and SHA-256 for
messages less than 264 bits in length. SHA-384 and SHA-512 are recommended for
messages less than 2128 bits in length.
The value of digital fingerprints is straightforward, and there are many choices of
hashing algorithms to use. When applying a hashing algorithm, one may encounter
tradeoffs such as collision resistance and also processing speed.
Hashing Algorithm Speed Comparison
Hashing algorithms consume data processing resources of one form or another.
This chart comes from Javamex showing the differences in processing time for the
various hashing algorithms.
Applications of SHA Hashing Algorithms
Applications for SHA-1 and SHA-2 are many for demonstrating message integrity,
including password storage, file verification, and digital signatures. They are used
in common Internet applications such as TLS and SSL, PGP, SSH, S/MIME and IPsec.
SHA-2 is widely used for authentication of software packages and digital media.
SHA-256 and SHA-512 have been proposed for use in DNSSEC and also for Unix and
Linux password hashing. SHA-256 is used for Bitcoin transaction verification.
boblandstrom.com
@DataCenterBob
RUINEDFORORDINARY...

More Related Content

What's hot (20)

PDF
Design of Secure Hash Algorithm(SHA)
Saravanan T.M
 
PDF
The MD5 hashing algorithm
Bob Landstrom
 
PDF
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
KanchanPatil34
 
PPTX
Number theory and cryptography
Yasser Ali
 
PDF
2. Stream Ciphers
Sam Bowne
 
PPTX
Cryptography and applications
thai
 
PPTX
Hash function
Harry Potter
 
PDF
Arrays in Java
Naz Abdalla
 
PPTX
Topological sort
Burhan Ahmed
 
PPTX
How Hashing Algorithms Work
CheapSSLsecurity
 
PPTX
Inheritance In Java
Manish Sahu
 
PPTX
Encapsulating security payload in Cryptography and Network Security
Koushil Mankali
 
PPT
Java interfaces
Raja Sekhar
 
PPTX
Block cipher modes of operation
harshit chavda
 
PPTX
0 1 knapsack using branch and bound
Abhishek Singh
 
PPTX
SHA512.pptx
ssuserb4287c
 
PPT
Ip Sec
Ram Dutt Shukla
 
PPT
Secure hashing algorithm
Karteek Paruchuri
 
PPTX
Columnar transposition cipher
Waqar Memon
 
Design of Secure Hash Algorithm(SHA)
Saravanan T.M
 
The MD5 hashing algorithm
Bob Landstrom
 
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
KanchanPatil34
 
Number theory and cryptography
Yasser Ali
 
2. Stream Ciphers
Sam Bowne
 
Cryptography and applications
thai
 
Hash function
Harry Potter
 
Arrays in Java
Naz Abdalla
 
Topological sort
Burhan Ahmed
 
How Hashing Algorithms Work
CheapSSLsecurity
 
Inheritance In Java
Manish Sahu
 
Encapsulating security payload in Cryptography and Network Security
Koushil Mankali
 
Java interfaces
Raja Sekhar
 
Block cipher modes of operation
harshit chavda
 
0 1 knapsack using branch and bound
Abhishek Singh
 
SHA512.pptx
ssuserb4287c
 
Secure hashing algorithm
Karteek Paruchuri
 
Columnar transposition cipher
Waqar Memon
 

Viewers also liked (20)

PDF
Fungsi Hash & Algoritma SHA-256 - Presentation
Aditya Gusti Tammam
 
PPTX
Secure Hash Algorithm (SHA-512)
DUET
 
PPT
Hash Function & Analysis
Pawandeep Kaur
 
PPTX
Hash Function
Siddharth Srivastava
 
PPTX
Secure Hash Algorithm
Vishakha Agarwal
 
PPTX
SHA-3, Keccak & Sponge function
Gennaro Caccavale
 
PDF
Keccak
Rajeev Verma
 
PDF
Dnssec tutorial-crypto-defs
AFRINIC
 
PPTX
Tiny encryption algorithm
Farah M. Altufaili
 
PDF
Fota Delta Size Reduction Using FIle Similarity Algorithms
Shivansh Gaur
 
PDF
Fungsi Hash & Algoritma SHA-256
Aditya Gusti Tammam
 
PPT
C08 crypto-digital signature13
ravik09783
 
PDF
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Dylan Field
 
PDF
Introduction To Digital Signatures
Robert Talbert
 
PPTX
Hash Techniques in Cryptography
Basudev Saha
 
PPTX
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Fungsi Hash & Algoritma SHA-256 - Presentation
Aditya Gusti Tammam
 
Secure Hash Algorithm (SHA-512)
DUET
 
Hash Function & Analysis
Pawandeep Kaur
 
Hash Function
Siddharth Srivastava
 
Secure Hash Algorithm
Vishakha Agarwal
 
SHA-3, Keccak & Sponge function
Gennaro Caccavale
 
Keccak
Rajeev Verma
 
Dnssec tutorial-crypto-defs
AFRINIC
 
Tiny encryption algorithm
Farah M. Altufaili
 
Fota Delta Size Reduction Using FIle Similarity Algorithms
Shivansh Gaur
 
Fungsi Hash & Algoritma SHA-256
Aditya Gusti Tammam
 
C08 crypto-digital signature13
ravik09783
 
Hash Functions, the MD5 Algorithm and the Future (SHA-3)
Dylan Field
 
Introduction To Digital Signatures
Robert Talbert
 
Hash Techniques in Cryptography
Basudev Saha
 
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Ad

Similar to The SHA Hashing Algorithm (20)

PPTX
Network Security Unit-2 topic Part-2.pptx
harshalipics
 
PDF
Hashing
yashwantsingh122
 
PPTX
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
NAtional Institute of TEchnology Rourkela , Galgotias University
 
PPTX
Secure Hashing Techniques - Introduction
Udhayyagethan Mano
 
PPTX
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
PDF
Sha
ha123
 
PDF
A review towards various hash algorithms and their comparative analysis
IRJET Journal
 
PPT
An Introduction to Hashing: A basic understanding
prabhatv1
 
PPTX
Cryptography-Hash-Functions.pptx
AngeloChangcoco
 
PPT
SHA 3 algorithm introduction, diagram, design
SohaKhan63
 
PPTX
Sha-1 Collision
University of South Wales
 
PDF
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
PDF
Hash Functions - Uses, Requirements, Secure Hash Algorithm
GoldenMIT
 
PDF
Count based Secured Hash Algorithm.
IOSR Journals
 
PPTX
Hashes
primeteacher32
 
PPTX
IS413 Topic 5.pptx
WarrenPhiri4
 
PDF
cryptography summary hash function slides
sarala9
 
PDF
1 s2.0-s1877050915013460-main
kalachandru
 
PPT
Hash crypto
Fraboni Ec
 
PPT
Hash crypto
Harry Potter
 
Network Security Unit-2 topic Part-2.pptx
harshalipics
 
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
NAtional Institute of TEchnology Rourkela , Galgotias University
 
Secure Hashing Techniques - Introduction
Udhayyagethan Mano
 
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Sha
ha123
 
A review towards various hash algorithms and their comparative analysis
IRJET Journal
 
An Introduction to Hashing: A basic understanding
prabhatv1
 
Cryptography-Hash-Functions.pptx
AngeloChangcoco
 
SHA 3 algorithm introduction, diagram, design
SohaKhan63
 
Sha-1 Collision
University of South Wales
 
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Hash Functions - Uses, Requirements, Secure Hash Algorithm
GoldenMIT
 
Count based Secured Hash Algorithm.
IOSR Journals
 
IS413 Topic 5.pptx
WarrenPhiri4
 
cryptography summary hash function slides
sarala9
 
1 s2.0-s1877050915013460-main
kalachandru
 
Hash crypto
Fraboni Ec
 
Hash crypto
Harry Potter
 
Ad

Recently uploaded (20)

PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
The 2025 InfraRed Report - Redpoint Ventures
Razin Mustafiz
 
PDF
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
PDF
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PPTX
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
The 2025 InfraRed Report - Redpoint Ventures
Razin Mustafiz
 
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 

The SHA Hashing Algorithm

  • 1. The SHA Hashing Algorithm
  • 2. Data Protection in the Data Center Why are we bothering with cryptography when talking about data centers? If we believe that the data center is a treasure chest for our business’ most important assets, then we have to realize the importance and the role of cryptography for: a)  Maintaining the integrity of data b)  Protecting data privacy, especially with new regulatory constraints - In Motion, In Use, and At Rest
  • 3. Hashing Algorithms and Cryptography Hashing algorithms (or hashing functions) are not technically encryption algorithms at all. They are though, an essential component in cryptography along with symmetric encryption and asymmetric encryption algorithms. Hashing algorithms are also known as a Message Digests.
  • 4. Message Digest: Data Fingerprint Message-Digest algorithms are mathematical functions that transform a data string of arbitrary length into a new string of data of fixed length (In this case, there are options for the length of the digest, but it’s always fixed for each algorithm). The output of the algorithm can be thought of as a “fingerprint” of the input data. That is, it is a unique representation of the input data. Important Points: 1)  It should be impossible to have two different versions of the input data that returns the same output data. 2)  It cannot be reversed! It should be impossible to produce the input value even if you know the output value. It’s a one-way function!
  • 5. The Secure Hash Algorithm (SHA) The SHA hashing algorithm is actually a family of algorithms: SHA-0, SHA-1, SHA-2, SHA-3. Created through the US Government’s “Capstone” project, driven by NIST and the NSA. SHA-0 was quickly withdrawn after release and replaced by SHA-1 SHA-1 produces a 160-bit hash value. In 2015, SHA-1 was revealed to be vulnerable to collisions at a cost of only $75-120K using EC2 nodes, putting it within reach of criminal syndicates.
  • 6. SHA-2 The US Government recommends SHA-2 as a replacement for SHA-1. SHA-2 is a family of hash functions in its own way ! Message Digest lengths of 224, 256, 384, and 512 bits are available.
  • 7. How does it work then? SHA works like all hashing functions work, by applying a compression function to the input data. SHA works in block mode, first separating the data into words, and then grouping the words into blocks. The words are 32-bit strings converted to hexadecimal, grouped together as 16 words to make up a 512-bit block. The message can be padded with zeros and an integer describing the original message length is appended. Once formatted for processing, the actual hash is generated. The 512-bit blocks are taken in order, processing them algorithmically through a series of buffers. After done for all blocks, the entire message is now represented by the fixed length string of the hash.
  • 8. Of course- SHA-3 And if you’re wondering, of course there is also a SHA-3. NIST created a competition in 2006 to create a new hashing function standard. This was not to replace SHA-2, but as an alternative and dissimilar cryptographic hashing function. SHA-3 has been an official NIST hashing standard since 2015. A notable “dissimilarity” with SHA-3 is its use of a sponge function, which is unlike earlier SHA algorithms.
  • 9. Which SHA should I use? So when do you use which SHA algorithm? Well the Federal Information Processing Standard (FIPS) recommends the following. Use SHA-1, SHA-224, and SHA-256 for messages less than 264 bits in length. SHA-384 and SHA-512 are recommended for messages less than 2128 bits in length. The value of digital fingerprints is straightforward, and there are many choices of hashing algorithms to use. When applying a hashing algorithm, one may encounter tradeoffs such as collision resistance and also processing speed.
  • 10. Hashing Algorithm Speed Comparison Hashing algorithms consume data processing resources of one form or another. This chart comes from Javamex showing the differences in processing time for the various hashing algorithms.
  • 11. Applications of SHA Hashing Algorithms Applications for SHA-1 and SHA-2 are many for demonstrating message integrity, including password storage, file verification, and digital signatures. They are used in common Internet applications such as TLS and SSL, PGP, SSH, S/MIME and IPsec. SHA-2 is widely used for authentication of software packages and digital media. SHA-256 and SHA-512 have been proposed for use in DNSSEC and also for Unix and Linux password hashing. SHA-256 is used for Bitcoin transaction verification.