ANALYSIS OF SHA-1 HASH FUNCTION ALGORITHM

Authors

  • Mirzaxmedova E’zozaxon National University of Uzbekistan named after Mirzo Ulugbek Master student in the Department of information security Author

DOI:

https://doi.org/10.1808/8pke4e22

Keywords:

SHA-1, plaintext, hash value, initial hash value, K_t constants, logical functions.

Abstract

In the field of information security, hashing algorithms play an important role in ensuring the integrity and confidentiality of data. One of the most widely used hashing algorithms available today is the Secure Hash Algorithm (SHA-1). The hashing process in the SHA-1 algorithm consists of two main steps: initial processing of the plaintext (completing the message and dividing it into blocks), calculating the hash value. This article describes each step of the hash algorithm separately and shows how to reverse the steps to determine the plaintext from the hash value.

References

Federal Information Processing Standards (FIPS) Publication 180-2. Secure Hash Standard (SHS). 2002 August 1.

Federal Information Processing Standards (FIPS) Publication 180-3. Secure Hash Standard (SHS). October 2008.

Federal Information Processing Standards (FIPS) Publication 180-4. Secure Hash Standard (SHS). March 2012.

Federal Information Processing Standards (FIPS) Publication 180-1. Secure Hash Standard (SHS). 1995 April 17.

Federal Information Processing Standards (FIPS) Publication 180. Secure Hash Standard (SHS). 1993 May 11.

Federal Information Processing Standards (FIPS) Publication 180-4. Secure Hash Standard (SHS). August 2015.

Christof Paar and Jan Pelzl. Understanding Cryptography – A textbook for students and practitioners. Chapter 11 – Hash Functions. 2009 October 29.

D. Y. Akbarov. Axborot xavfsizligini ta’minlashning kriptografik usullari va ularning qo‘llanilishi. – Toshkent, “O‘zbekiston markasi” nashriyoti, 2009 – 432 bet.

Zafarjon o‘g‘li, Muydinov Muhammadzoir. "SHOYIM BO ‘TAYEV HIKOYALARIDA XARAKTERLAR TASVIRI." Konferensiyalar| Conferences. Vol. 1. No. 4. 2024.

Zafarjon o'g'li, Muydinov Muhammadzoir. "ANVAR OBIDJON ASARLARINING NASRIY POETIKASI." (2023).

Zafarjon o'g'li, Muydinov Muhammadzoir. "ANVAR OBIDJONNING IJOD LABARATORIYASINING SHAKLLANISHIGA BIR NAZAR." (2023).

Downloads

Published

2024-04-24

How to Cite

Mirzaxmedova E’zozaxon. (2024). ANALYSIS OF SHA-1 HASH FUNCTION ALGORITHM. INTERNATIONAL JOURNAL OF SCIENCE AND TECHNOLOGY, 1(14), 83-89. https://doi.org/10.1808/8pke4e22

Similar Articles

71-80 of 166

You may also start an advanced similarity search for this article.