January 15, 2002
Practical Aspects of Modern Cryptography
A Cryptographic Hash:
SHA-1
•
What’s in the final 32-bit transform?
•
Take the rightmost word.
•
Add in the leftmost word rotated 5 bits.
•
Add in a round-dependent function
f
of the
middle three words.