O'Reilly logo

Practical Cryptography by Al-Sakib Khan Pathan, Saiful Azad

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

11SECURE HASH ALGORITHM

SADDAM HOSSAIN MUKTA AND SAIFUL AZAD

Contents

Keywords

11.1 Basic Hash Function Concept

11.2 Applications

11.3 Steps of SHA-1

11.3.1 Appending Original Message Lengths and Padding

11.3.2 Initialization

11.3.3 Message Processing

11.3.4 Output

11.4 An Example

11.5 Implementation

11.6 Conclusion

Keywords

Authentication check

Hash function

Integrity check

Secure Hash Algorithm

SHA-1

In 1990, Ron Rivest invented an algorithm utilizing the concept of hash function, called Message Digest 4 (MD4). He extended that algorithm in 1992, and named it Message Digest 5 (MD5). Later in 1993, the National Institute of Standards and Technology (NIST) developed and published an algorithm as a Federal Information Processing Standard (FIPS ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required