January 29, 2002
Practical Aspects of Modern Cryptography
32
A Cryptographic Hash:  SHA-1
nDepending on the round, the “non-linear” function f is one of the following.
n
n f(X,Y,Z) = (XÙY) Ú ((ØX)ÙZ)
n f(X,Y,Z) = (XÙY) Ú (XÙZ) Ú (YÙZ)
n f(X,Y,Z) = X Å Y Å Z