• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » What is SHA or Secure Hash Algorithm?

By Abhishek Ghosh September 23, 2014 9:40 am Updated on September 23, 2014

What is SHA or Secure Hash Algorithm?

Advertisement

Secure Hash Algorithm (SHA) refers to a group of standardized cryptologic hash functions. These are used to calculate a unique check for any digital data and are the basis for creating a digital signature. The check value is used to ensure the integrity of a message. If two messages give the same test value, is the equality of the messages which normally to be expected to be guaranteed, without prejudice any targeted attempts to manipulate the data. Therefore if we demand a cryptographic hash function, for safety; SHA or Secure Hash Algorithm should virtually make impossible to generate two different messages with the same test value with guess or reverse engineering. [Read : Encryption and Decryption ]

 

What is the History of Secure Hash Algorithm (SHA)?

 

The National Institute of Standards and Technology (NIST) in collaboration with the National Security Agency (which now infamously known to all as NSA) developed a hash function as part of the Digital Signature Algorithms (DSA) for the Digital Signature Standard (DSS). The function was published in 1994. The Secure Hash Standard (SHS) designated a standard which specifies the secure hash algorithm (SHA) with a hash value of 160 bits length for any digital data from a maximum of 2 Exbibyte length. Internal blocks of size 512 bits (64 bytes) were used in this standard. The algorithm is similar in design to that of MD4 developed by Ronald L. Rivest. The SHA has been corrected due to a in 1995 due to a design flaw. This new variant is now known as SHA-1, the original is referred as SHA-0. SHA-0, almost not used now. Principle, as said was based on the same design and goals as in MD4. With its longer hash value of 160 bits SHA was more resistant to brute-force attacks. [Read the practical usage of RSA, DSA Keys]

However, the corrected version of the original SHA ( read correcting the design flaws of SHA-0 ) differs from SHA-0 by very little more detail, it had not introduced other measures that can immediately give a much higher level of security. The cryptanalysis confirms, however, that the change significantly complicated back calculation.

Advertisement

---

On 15 February 2005, cryptography expert Bruce Schneier reported in his blog that scientists Xiaoyun Wang, Yiqun Lisa Yin and Hongbo Yu of Shandong University have successfully broken SHA-1. They could manage the back calculation with high-performance computers. Collisions were not published until these days to preserve safety.

A short time later, on 17 August 2005, Andrew Yao and Frances Yao at one conference presented another, more efficient collision attack on SHA-1, which reduced the amount of calculation needed. In August 2006, another, much more serious attack against SHA-1 was presented at the CRYPTO 2006, which may possibly in practice can take effects. In this attack, a part of the fake message to the content were freely chosen (up to 25% currently). In the recent collision attacks, the so-called hash twins were formed only with meaningless combinations of letters of the plaintext and were therefore easily identified.

A critical attack scenario assumes, however that the attacker can create a second, at least useful in variant parts of a document that gives the same SHA-1 value and thus also the same signature. The case of the new attack method currently remaining 75% meaningless letter combinations (i.e. garbage) can possibly, at least technically easily hidden from the eyes of an untrained observer. The attacker can therefore claim that the forged version was signed in place of the original version. [Key is a Terminology]

SHA-or-Secure-Hash-Algorithm

 

What is the Current State of Secure Hash Algorithm (SHA)?

 

From August 8, 2007 to May 12, 2009 a research group of the Technical University of Graz attempted collisions in SHA-1 algorithm to find flaws. The project was terminated due to insufficient progress. In response to becoming a known victim, a workshop was held by National Institute of Standards and Technology (NIST) in October 2005, in which the current state of cryptographic hash functions was discussed. NIST recommends that the transition from SHA-1 to hash functions SHA-2 family (SHA-224, SHA-256, SHA-384, SHA-512) is important. In the long run this will be replaced by a new standard named SHA-3. For this purpose, NIST modeled on the Advanced Encryption Standard (AES) on a tender. The final selection and appointment went on October 2012.

NIST has four variants of the published algorithms – SHA-224, SHA-256, SHA-384 and SHA-512. These developments are often collectively referred to as SHA-2. The SHA-1 and SHA-256 are also the basis for a cipher block.

RFC 3174 = Secure Hash Algorithm 1 (SHA1) (September 2001)
RFC 4634 = Secure Hash Algorithms (SHA and HMAC-SHA) (July 2006)
RFC 6234 = Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) (May 2011)

Tagged With secure hash algorithm , sha hash length , What is the latest version of the Secure Hash Algorithm? , hashing latest version , secure hash algorithm irs tigta , how long is sha1 hash , secure hash algorithm 256 , Secure hash , SHA hash algorithm , sha algorithm

This Article Has Been Shared 535 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Orthopaedic Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to What is SHA or Secure Hash Algorithm?

  • Enterprise Application Integration

    Enterprise Application Integration (EAI) is the use of the architecture based on middleware allowing third parties to manage heterogeneous exchanges for a business.

  • Outsourcing to Public Cloud : How You Should Proceed

    Outsourcing to Public Cloud includes aspects general objectives, establishment of a Outsourcing management with organizational structures and responsibilities.

  • Create Perfect Silhouette with Two Easy Techniques

    Create perfect silhouette with two easy techniques. The methods we have described, it is easy to create a picture of silhouette of any moving or static subject.

  • Local Clouds Offer Little Protection

    Local Clouds, in this PRISM era is promoted or sometimes just said without any influence to confer more protection to privacy and security. But this is not the truth.

  • Six Steps for Cloud Security

    Learn how to protect security and privacy with our guide six steps for cloud security. Digitization of companies has increased, but often it lacks basic security.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (20K Followers)
  • Twitter (4.9k Followers)
  • Facebook (5.8k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.2k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud Computing : Cybersecurity Tips for Small Business Owners January 20, 2021
  • Arduino : Independently Blink Multiple LED January 18, 2021
  • What is a Loosely Coupled System? January 17, 2021
  • How To Repack Installed Software on Debian/Ubuntu January 16, 2021
  • Components of Agile Software Development January 15, 2021

 

About This Article

Cite this article as: Abhishek Ghosh, "What is SHA or Secure Hash Algorithm?," in The Customize Windows, September 23, 2014, January 20, 2021, https://thecustomizewindows.com/2014/09/sha-secure-hash-algorithm/.

Source:The Customize Windows, JiMA.in

 

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Cookie Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2021 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy