1 / 10

PROJECT : ALGORITHM SHA-1

PROJECT : ALGORITHM SHA-1. Plan. Introduction Why this subject ? About this subject Definition Applications Flash Animation The difficulties we have met What we learned ?. Introduction. The subject was to create a flash animation about the SHA-1 algorithm.

minerva
Télécharger la présentation

PROJECT : ALGORITHM SHA-1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PROJECT :ALGORITHM SHA-1

  2. Plan • Introduction • Why this subject ? • About this subject • Definition • Applications • Flash Animation • The difficulties we have met • What we learned ?

  3. Introduction The subject was to create a flash animation about the SHA-1 algorithm. For our researches we used most exclusively the Internet. We found some explanations and some sources ( sha1.c and sha1.h) to codify a sentence.

  4. Why this subject ? At first we wanted to choose a project on the satellite Galileo but we did not find enough technical data. We could only find economical or political data on this matter (what it would cost and the advantage on the GPS system). So we decided to choose a subject about cryptographic function , the SHA-1 algorithm.

  5. Definition SHA-1: Secure Hash Algorithm It is a algorithm that is used in cryptography to make information confidential. It produces a 160-bit digest from a message with a maximum size of 2^64 bits. For example, The hash of the zero-length string is: SHA1(" ") = da39a3ee5e6b4b0d3255bfef95601890afd80709

  6. Definition A hash function takes a long string (or message) of any length as input and produces a fixed length string as output.

  7. Applications SHA-1 is employed in a large variety of popular security applications and protocols. This algorithm is one of the required secure hash algorithms used for the protection of sensitive unclassified information. SHA-1 is used by Digital Signature Standard (DSS), which is a standard used for digitally signing documents or other data.

  8. Flash Animation Our project includes to make a macromedia flash animation. We are creating a menu task with links to navigate from one page to a another one. It allows us to join the menu whenever we want.

  9. The difficulties we have met • Many of the data we found described the collisions of the SHA-1(a pair of messages which share the same digest). • For our project we had to create the Macromedia Flash animation and so we had to learn how to use it.

  10. What we learned ? • We had a little sight a the big area of the cryptographic world and it was quite interesting. • We discovered as well what the SHA-1 algorithm was. • It was possible for us to improve our English level during our work. • We learned how to use the Macromedia Flash software.

More Related