January 15, 2002
Practical Aspects of Modern Cryptography
A Cryptographic Hash:  SHA-1
•What’s in the final 32-bit transform?
•Take the rightmost word.
•Add in the leftmost word rotated 5 bits.
•Add in a round-dependent function f of the middle three words.
•Add in a round-dependent constant.
•Add in a portion of the 512-bit message.