SHA512
SHA512
• In recent years, the most widely used hash function has been the Secure Hash Algorithm
(SHA).
• SHA was developed by the National Institute of Standards and Technology (NIST) and
published as a federal information processing standard (FIPS 180) in 1993. When
weaknesses were discovered in SHA, now known as SHA-0, a revised version was issued
as FIPS 180-1 in 1995 and is referred to as SHA-1.
• The actual standards document is entitled “Secure Hash Standard.” SHA is based on the
hash function MD4, and its design closely models MD4. SHA-1 is also specified in RFC
3174, which essentially duplicates the material in FIPS 180-1 but adds a C code
implementation.
• SHA-1 produces a hash value of 160 bits. In 2002, NIST produced a revised version of
the standard, FIPS 180-2, that defined three new versions of SHA, with hash value
lengths of 256, 384, and 512 bits, known as SHA-256, SHA-384, and SHA-512,
respectively. Collectively, these hash algorithms are known as SHA-2
• The algorithm takes as input a message with a maximum length of less than 2128 bits and
produces as output a 512-bit message digest. The input is processed in 1024-bit blocks.
• Figure depicts the overall processing of a message to produce a digest. This follows the
general structure depicted in Figure.
Where,
Reference :William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006
SHA-512 PROCESSING OF A SINGLE 1024-BIT BLOCK
Reference :William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006
CREATION OF 80-WORD INPUT SEQUENCE FOR SHA-512 PROCESSING OF
SINGLE BLOCK
o
Reference :William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006