Hash and MAC Algorithms
Hash and MAC Algorithms
Hash
Functions
condense arbitrary size message to fixed size by processing message in blocks through some compression function either custom or block cipher based
Message
Authentication Code (MAC)
fixed sized authenticator for some message to provide authentication for message by using block cipher mode or hash function
Hash Algorithm Structure
Secure Hash Algorithm
SHA originally designed by NIST & NSA in 1993 was revised in 1995 as SHA-1 US standard for use with DSA signature scheme
standard is FIPS 180-1 1995, also Internet RFC3174 nb. the algorithm is SHA, the standard is SHS
based on design of MD4 with key differences produces 160-bit hash values recent 2005 results on security of SHA-1 have raised concerns on its use in future applications
Revised Secure Hash Standard
NIST
issued revision FIPS 180-2 in 2002 adds 3 additional versions of SHA
SHA-256, SHA-384, SHA-512
designed
for compatibility with increased security provided by the AES cipher structure & detail is similar to SHA-1 hence analysis should be similar but security levels are rather higher
SHA-512 Overview
SHA-512 Compression Function
heart
of the algorithm processing message in 1024-bit blocks consists of 80 rounds
updating a 512-bit buffer using a 64-bit value Wt derived from the current message block and a round constant based on cube root of first 80 prime numbers
SHA-512 Round Function
SHA-512 Round Function
Summary
have
considered:
some current hash algorithms
SHA-512 & Whirlpool
HMAC authentication using hash function CMAC authentication using a block cipher