Это видео недоступно.
Сожалеем об этом.

Lecture 21: SHA-1 Hash Function by Christof Paar

Поделиться
HTML-код
  • Опубликовано: 29 янв 2014
  • For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com

Комментарии • 36

  • @ben5235
    @ben5235 7 лет назад +9

    Fantastic lectures, professor Paar! Just want to thank you for the excellent effort you put into these! What you say at 55:00 is something all lecturers need to strive for!

  • @dpraajz
    @dpraajz 4 года назад +10

    19:00 SHA-1

  • @jimperkins9661
    @jimperkins9661 Год назад +1

    This was the most informative and clear lecture of the series so far (going through in order). Professor Paar's accent and cadence are particularly engaging (he should consider radio or film if lecturing get too booooring (said in the Paar style/cadence/idiom) for him).

  • @ralph17p
    @ralph17p 2 года назад

    Thank you! This series was instrumental in helping me pass my cryptography module at KCL. I'd read their stuff and come here to have it make sense. Then I went back and just made sure I knew their notation for the algorithms.

  • @sandyhardstone722
    @sandyhardstone722 5 лет назад +8

    Correct me if I'm wrong but this is actually SHA-0. SHA-1 requires a circular shift to the left by 1 position of the "words", Wj (16

    • @danielcontreras3045
      @danielcontreras3045 5 лет назад +2

      the best observation, the teacher was in a hurry xD

    • @migelbuscador6919
      @migelbuscador6919 3 года назад +3

      I wish I had read your comment earlier, I tried to reprogram this algorithm on my own, but I didnt work until I found this tiny mistake...

    • @bitte929
      @bitte929 7 месяцев назад

      Even I was confused with this, Thanks a lot

  • @kommxxx
    @kommxxx 8 лет назад +5

    Unfortunately there is a little mistake in the last formula for computing W_j: After XORing the four previously computed Ws one has to do a rotation to the left by one bit.

  • @michalbotor
    @michalbotor 4 года назад +2

    it's funny when you watch it online. what delay? you're right on my schedule. :D

  • @saurabhparekh884
    @saurabhparekh884 8 лет назад

    Thank you so much sir and your videos are really helpful thank you..!!

  • @Zelmann1
    @Zelmann1 6 лет назад

    Best cryptography lectures :)

  • @martinpattara
    @martinpattara 7 лет назад +3

    Thanks Professor .Does Sha1 specifies anything about IV (ie : h0 to be used when compressing x1 ) ?

  • @ahmedmuhammed6905
    @ahmedmuhammed6905 2 года назад

    It is really enjoyable to watch it

  • @ahmedmamdouh3964
    @ahmedmamdouh3964 7 месяцев назад +1

    SHA1: algorithm 21:40 (high level)
    SHA1: rounds details 52:30
    SHA1: word scheduler 1:11:57

  • @__angle
    @__angle Год назад

    Thanks again for all this great stuff.
    I would like to know where i could find explanation about the WHY (why we use those 4 constants why we use those 4 functions and why we shift the message like that). I imagine that there is a Mathematical reasoning behind those choices and i would really be interested to understand them. Thanks !!!

  • @fikrikabakcha7210
    @fikrikabakcha7210 9 лет назад

    Vielen Dank! Grüße aus Karlsruhe!

  • @Maiiepmaidiep2610
    @Maiiepmaidiep2610 7 лет назад +10

    SHA-1 is now dead but this lecture is still valuable for learning purpose

  • @1UniverseGames
    @1UniverseGames 3 года назад

    Which software or tool.to analyze this collision, any could name it

  • @1UniverseGames
    @1UniverseGames 3 года назад

    Any programming explanation of these lessons. Or any resources to learn programming for these lecture. Any helps

  • @spdx1
    @spdx1 6 лет назад +3

    The door was closed...

  • @prashantdhumal2483
    @prashantdhumal2483 6 лет назад

    Hi
    Does SHA means secure hash ? if yes then where is the security comes from since we do not have secret value while generating SHA-1 hash

    • @jacksnow1381
      @jacksnow1381 6 лет назад

      Prashant Dhumal
      its secure for using in cryptographic uses like finger print and using in digital signature algorithms and ... . it has 4 requirements professor Paar mentioned in lecture 20. there are other hash functions which are not secure and doesn't have those requirements.

  • @olegmenyaylenko3449
    @olegmenyaylenko3449 4 года назад +1

    haha 3 years after the lecture, Google found the first SHA-1 collision

  • @gibsons4188
    @gibsons4188 7 лет назад

    'Heres a .vbs to start your sha-1 hash dictionary
    'records input word and output sha-1 hash ie. Cryptography, b804ec5a0d83d19d8db908572f51196505d09f98
    'thanks to the prof for making these videos public.
    Option Explicit
    Dim asc, enc, bytes, instr, outstr, pos, FS, FT
    Const ForReading = 1, ForWriting = 2, ForAppending = 8
    instr = Inputbox("Enter string to encrypt with SHA-1:","")
    Set asc = CreateObject("System.Text.UTF8Encoding")
    Set enc = CreateObject("System.Security.Cryptography.SHA1CryptoServiceProvider")
    bytes = asc.GetBytes_4(instr)
    bytes = enc.ComputeHash_2((bytes))
    outstr = ""
    Set FS = CreateObject("Scripting.FileSystemObject")
    Set FT = FS.OpenTextFile("sha1.txt", ForAppending, True)
    For pos = 1 To Lenb(bytes)
    outstr = outstr & LCase(Right("0" & Hex(Ascb(Midb(bytes, pos, 1))), 2))
    Next
    FT.WriteLine(instr & "," & outstr)
    FT.Close
    WScript.Echo instr & "," & outstr & vbcrlf & "added to sha1.txt"
    WScript.quit

    • @aethrya
      @aethrya Год назад

      whatever you say nerd

  • @imraniqbal4176
    @imraniqbal4176 Год назад

    Nice

  • @m.dvenkatesh7718
    @m.dvenkatesh7718 6 лет назад

    We know everything why it is difficult to reverse engineering ( i mean encryption in Bitcoin)

    • @douwehuysmans5959
      @douwehuysmans5959 4 года назад +1

      I know this is 2 years later but the reason is that information gets lost.
      You AND two bits A and B, and you get a 0 you only know that A and B were not both 1, but you don't know if A was 0 or B was 0 or both were 0. This makes it hard to reverse engineer

  • @saurabhparekh3927
    @saurabhparekh3927 8 лет назад

    are there any lectures on SHA-512

    • @introductiontocryptography4223
      @introductiontocryptography4223  8 лет назад +10

      +Saurabh Parekh Unfortunately not. However, SHA-512 is not that different from SHA-1. Once you understood SHA-1, SHA-512 shouldn't too difficult. (Note that SHA-3 is completely different from SHA-1 und -2). Cheers, christof

    • @NirantK
      @NirantK 8 лет назад

      You can also refer Foruzan's Cryptography book for SHA-12. It has detailed explaination of each round and so on.

    • @sathyamurthisadhasivan6275
      @sathyamurthisadhasivan6275 8 лет назад

      Now, coming to SHA-3, do you plan to offer a video lecture on it please?
      It is quite convoluted and all I am seeing is the push for its adoption for most of the future hash designs...

    • @iurnah
      @iurnah 6 лет назад

      He actually did the SHA-3 what's a amazing professor, ruclips.net/video/JWskjzgiIa4/видео.html

  • @MrPinder91
    @MrPinder91 7 лет назад

    Please make a video regarding sha-3