Explore chapters and articles related to this topic
Practical Constructions of Symmetric-Key Primitives
Published in Jonathan Katz, Yehuda Lindell, Introduction to Modern Cryptography, 2020
SHA-1. The Secure Hash Algorithms (SHA) refer to a set of cryptographic hash functions standardized by NIST. The hash function SHA-1, standardized in 1995, has a 160-bit output length and was considered secure for many years. Beginning in 2005, theoretical analysis indicated that collisions in SHA-1 could be found using roughly 269 hash-function evaluations, which is much lower than the 280 hash-function evaluations that would be needed for a birthday attack. This prompted researchers to recommend migrating away from SHA-1; nevertheless, since even 269 operations is still significant, an explicit collision in SHA-1 remained out of reach. It was not until 2017 that an improvement in the collision-finding attack, along with tremendous computational resources devoted by Google, enabled researchers to find an explicit collision. The attack required the equivalent of 263 hash-function evaluations, and took 6,500 CPU years (along with 100 GPU years) to execute on a distributed cluster of machines. As of the time of this writing, more-devastating attacks have been found, and SHA-1 is no longer recommended for use.
An Integration Approach of an IoT and Cyber-Physical System for Security Perspective
Published in Amit Kumar Tyagi, Niladhuri Sreenath, Handbook of Research of Internet of Things and Cyber-Physical Systems, 2022
Khushboo Tripathi, Deepshikha Agarwal, Kumar Krishen
IoT requires a lightweight and very secure mechanism which is also quick in generating a cipher text for the plaintext message. Here we discuss the Improved-AES encryption scheme with modifications related to IoT, WSN, and CPS. Further some results will show that this mechanism proves to be a good choice. To provide message authentication, we have applied SHA1 in Improved-AES unlike in traditional AES. SHA1 is a hash-function based message authentication mechanism. It is used when the fixed hash_value is 128 bits long. If the length of hash value is increased to 256 or 512 bits, higher versions of SHA can be used combined with AES.
Message Authentication
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
SHA-1 is a cryptographic hash function published by the National Institute of Standards and Technology (NIST). The three SHA algorithms are SHA-0, SHA-1, and SHA-2. The SHA-0 algorithm was not used in many applications. On the other hand, SHA-2 differs from the SHA-1 hash function. SHA-1 is the most widely used hash function.
Secured Model for Internet of Things (IoT) to Monitor Smart Field Data with Integrated Real-Time Cloud Using Lightweight Cryptography
Published in IETE Journal of Research, 2021
IDEA was the most reliably effective algorithm in our assessment. In our Concept tests, as seen in the figure, SHA-1 is roughly twice the speed of all other algorithms in consideration. Sadly, SHA-1 has proved to be less stable than expected recently and SHA-256 is recommended at the moment. The results showed the best cryptographic algorithms for use in real-time systems RSA-1024 and SHA-256. Virtually any symmetrical algorithm could be picked, but IDEA was our quickest evaluation.