Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.



No description

Mi7ai Rottmayer

on 16 June 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of SHA-2

TLS and SSL, PGP, SSH, S/MIME, and IPsec
Examples of SHA-2 variants
0x d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f
0x e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
0x 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b
0x cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
0x 6ed0dd02806fa89e25de060c19d3ac86cabb87d6a0ddd05c333b84f4
0x c672b8d1ef56ed28ab87c3622c5114069bdd3ad7b8f9737498d0c01ecef0967a
Birthday attack &Paradox
SHA-256 and SHA-512
Functions with 32-bit and 64-bit words
SHA-224 and SHA-384
Different initial values
Stands for Secure Hash Algorithm and is a set of cryptographic hash functions designed by the U.S. National Security Agency (NSA) and published in 2001 by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard (FIPS)

Hash converter: MD5,SHA-1,SHA-256,SHA-384,SHA-512
SHA-512/224 and SHA-512/256
Generated initial values
Collision: finding two different inputs such that hashes are one equal to another
Made by a set of six hash functions with digests that are 224, 256, 384 or 512 bits.
Identical virtual structures
Different number of rounds
SHA-256 authenticates Debian GNU/Linux software packages
SHA-512 authenticate archival video from the ICTR(International Criminal Tribunal of the Rwandan) genocide
SHA-256 and SHA-512 are proposed for use in DNSSEC(Domain Name System Security Extensions)
Unix and Linux vendors are moving to using 256- and 512-bit SHA-2 for secure password hashing
The SHA-2 family of algorithms are patented in US
Thanks for watching
Any questions?
Full transcript