January 15, 2002
Practical Aspects of Modern Cryptography
A Cryptographic Hash:
SHA-1
Whats in the final 32-bit transform?
Take the rightmost word.
Add in the leftmost word rotated 5 bits.
Add in a round-dependent function
f
of the
middle three words.
Add in a round-dependent constant.
Add in a portion of the 512-bit message.