Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

SHA-2

No description
by

Mi7ai Rottmayer

on 16 June 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of SHA-2

Applications
TLS and SSL, PGP, SSH, S/MIME, and IPsec
Examples of SHA-2 variants
SHA224("")
0x d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f
SHA256("")
0x e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA384("")
0x 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b
SHA512("")
0x cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
SHA512/224("")
0x 6ed0dd02806fa89e25de060c19d3ac86cabb87d6a0ddd05c333b84f4
SHA512/256("")
0x c672b8d1ef56ed28ab87c3622c5114069bdd3ad7b8f9737498d0c01ecef0967a
Birthday attack &Paradox
SHA-256 and SHA-512
Functions with 32-bit and 64-bit words
SHA-224 and SHA-384
Different initial values
Stands for Secure Hash Algorithm and is a set of cryptographic hash functions designed by the U.S. National Security Agency (NSA) and published in 2001 by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard (FIPS)
SHA-2

Hash converter: MD5,SHA-1,SHA-256,SHA-384,SHA-512
http://webcodertools.com/hashstring
SHA-512/224 and SHA-512/256
Generated initial values
Collision: finding two different inputs such that hashes are one equal to another
Definition:
Composition
Made by a set of six hash functions with digests that are 224, 256, 384 or 512 bits.
Identical virtual structures
Different number of rounds
SHA-256 authenticates Debian GNU/Linux software packages
SHA-512 authenticate archival video from the ICTR(International Criminal Tribunal of the Rwandan) genocide
SHA-256 and SHA-512 are proposed for use in DNSSEC(Domain Name System Security Extensions)
Unix and Linux vendors are moving to using 256- and 512-bit SHA-2 for secure password hashing
The SHA-2 family of algorithms are patented in US
Thanks for watching
Any questions?
Full transcript