An hash function is a function with these properties:
- Preimage resistance: given an hash , it should be difficult to find any message such that ;
- Second-preimage resistance (or weak collision resistance): given an input , it should be difficult to find another input such that
- (Strong) Collision resistance: It should be difficult to find a tuple of messages and such that and . The pair is called a cryptographic hash collision.
The hash function can take a large input and map it to a relatively small hash, so it can be used to map large domains to small domains.
It’s not possible to know if a function with those property exist, there are some functions that seem to have those but we cannot be sure. (For example RSA now seems a secure algorithm, but also MD5 seemed safe and now it’s completely broken).
SHA-1 Operations and Functions
SHA-1 is a didactic example which algorithm is based on bitwise operations in order to mix the bits of the original message.
The used operations are:
- Bitwise AND
- Bitwsie OR
- Bitwise XOR
- Bitwise Complement
- Addition modulo
- Left and right shift operation
- Rotate left operation
ASICs optimize those operations, that’ why they are very fast at mining.
The SHA-1 functions are:
The SHA-1 constants are four and they are 230 times the square roots of 2, 3, 5 and 10. These constants are used in order to avoid the reverse engineering of the algorithm (nothing up my sleeve).
We use padding in order for the length of the message to be a multiple of 512 bits.
The message are parsed into blocks each one of 512 bits. Each block is parsed into 16 32-bits words.
The full algorithm is summarized in the following image.