• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » What is SHA or Secure Hash Algorithm?

By Abhishek Ghosh September 23, 2014 9:40 am Updated on September 23, 2014

What is SHA or Secure Hash Algorithm?

Advertisement

Secure Hash Algorithm (SHA) refers to a group of standardized cryptologic hash functions. These are used to calculate a unique check for any digital data and are the basis for creating a digital signature. The check value is used to ensure the integrity of a message. If two messages give the same test value, is the equality of the messages which normally to be expected to be guaranteed, without prejudice any targeted attempts to manipulate the data. Therefore if we demand a cryptographic hash function, for safety; SHA or Secure Hash Algorithm should virtually make impossible to generate two different messages with the same test value with guess or reverse engineering. [Read : Encryption and Decryption ]

 

What is the History of Secure Hash Algorithm (SHA)?

 

The National Institute of Standards and Technology (NIST) in collaboration with the National Security Agency (which now infamously known to all as NSA) developed a hash function as part of the Digital Signature Algorithms (DSA) for the Digital Signature Standard (DSS). The function was published in 1994. The Secure Hash Standard (SHS) designated a standard which specifies the secure hash algorithm (SHA) with a hash value of 160 bits length for any digital data from a maximum of 2 Exbibyte length. Internal blocks of size 512 bits (64 bytes) were used in this standard. The algorithm is similar in design to that of MD4 developed by Ronald L. Rivest. The SHA has been corrected due to a in 1995 due to a design flaw. This new variant is now known as SHA-1, the original is referred as SHA-0. SHA-0, almost not used now. Principle, as said was based on the same design and goals as in MD4. With its longer hash value of 160 bits SHA was more resistant to brute-force attacks. [Read the practical usage of RSA, DSA Keys]

However, the corrected version of the original SHA ( read correcting the design flaws of SHA-0 ) differs from SHA-0 by very little more detail, it had not introduced other measures that can immediately give a much higher level of security. The cryptanalysis confirms, however, that the change significantly complicated back calculation.

Advertisement

---

On 15 February 2005, cryptography expert Bruce Schneier reported in his blog that scientists Xiaoyun Wang, Yiqun Lisa Yin and Hongbo Yu of Shandong University have successfully broken SHA-1. They could manage the back calculation with high-performance computers. Collisions were not published until these days to preserve safety.

A short time later, on 17 August 2005, Andrew Yao and Frances Yao at one conference presented another, more efficient collision attack on SHA-1, which reduced the amount of calculation needed. In August 2006, another, much more serious attack against SHA-1 was presented at the CRYPTO 2006, which may possibly in practice can take effects. In this attack, a part of the fake message to the content were freely chosen (up to 25% currently). In the recent collision attacks, the so-called hash twins were formed only with meaningless combinations of letters of the plaintext and were therefore easily identified.

A critical attack scenario assumes, however that the attacker can create a second, at least useful in variant parts of a document that gives the same SHA-1 value and thus also the same signature. The case of the new attack method currently remaining 75% meaningless letter combinations (i.e. garbage) can possibly, at least technically easily hidden from the eyes of an untrained observer. The attacker can therefore claim that the forged version was signed in place of the original version. [Key is a Terminology]

SHA-or-Secure-Hash-Algorithm

 

What is the Current State of Secure Hash Algorithm (SHA)?

 

From August 8, 2007 to May 12, 2009 a research group of the Technical University of Graz attempted collisions in SHA-1 algorithm to find flaws. The project was terminated due to insufficient progress. In response to becoming a known victim, a workshop was held by National Institute of Standards and Technology (NIST) in October 2005, in which the current state of cryptographic hash functions was discussed. NIST recommends that the transition from SHA-1 to hash functions SHA-2 family (SHA-224, SHA-256, SHA-384, SHA-512) is important. In the long run this will be replaced by a new standard named SHA-3. For this purpose, NIST modeled on the Advanced Encryption Standard (AES) on a tender. The final selection and appointment went on October 2012.

NIST has four variants of the published algorithms – SHA-224, SHA-256, SHA-384 and SHA-512. These developments are often collectively referred to as SHA-2. The SHA-1 and SHA-256 are also the basis for a cipher block.

RFC 3174 = Secure Hash Algorithm 1 (SHA1) (September 2001)
RFC 4634 = Secure Hash Algorithms (SHA and HMAC-SHA) (July 2006)
RFC 6234 = Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) (May 2011)

Tagged With secure hash algorithm , sha hash length , What is the latest version of the Secure Hash Algorithm? , hashing latest version , secure hash algorithm irs tigta , how long is sha1 hash , secure hash algorithm 256 , Secure hash , SHA hash algorithm , sha algorithm

This Article Has Been Shared 795 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to What is SHA or Secure Hash Algorithm?

  • Enterprise Application Integration

    Enterprise Application Integration (EAI) is the use of the architecture based on middleware allowing third parties to manage heterogeneous exchanges for a business.

  • Outsourcing to Public Cloud : How You Should Proceed

    Outsourcing to Public Cloud includes aspects general objectives, establishment of a Outsourcing management with organizational structures and responsibilities.

  • Create Perfect Silhouette with Two Easy Techniques

    Create perfect silhouette with two easy techniques. The methods we have described, it is easy to create a picture of silhouette of any moving or static subject.

  • Local Clouds Offer Little Protection

    Local Clouds, in this PRISM era is promoted or sometimes just said without any influence to confer more protection to privacy and security. But this is not the truth.

  • Six Steps for Cloud Security

    Learn how to protect security and privacy with our guide six steps for cloud security. Digitization of companies has increased, but often it lacks basic security.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is ChatGPT? February 3, 2023
  • Zebronics Pixaplay 16 : Entry Level Movie Projector Review February 2, 2023
  • What is Voice User Interface (VUI) January 31, 2023
  • Proxy Server: Design Pattern in Programming January 30, 2023
  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023

About This Article

Cite this article as: Abhishek Ghosh, "What is SHA or Secure Hash Algorithm?," in The Customize Windows, September 23, 2014, February 4, 2023, https://thecustomizewindows.com/2014/09/sha-secure-hash-algorithm/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT