Generated by GPT-5-mini| SHA-0 | |
|---|---|
| Name | SHA-0 |
| Designers | National Security Agency |
| Publish date | 1993 |
| Derived from | Secure Hash Standard |
| Related | SHA-1, SHA-2 |
| Digest size | 160 bits |
| Block size | 512 bits |
| Rounds | 80 |
| Status | Withdrawn / Obsolete |
SHA-0 SHA-0 is a 160-bit cryptographic hash function published in 1993 as part of the Secure Hash Standard by the National Institute of Standards and Technology in coordination with the National Security Agency. It produces a fixed-size 160-bit digest from variable-length input and was intended for integrity verification and digital signature applications such as those in the Digital Signature Algorithm era. Rapidly superseded, it was replaced by a minor revision known as SHA-1 after discovery of a design weakness; the function remains of historical and pedagogical interest within the cryptography community.
SHA-0 originated from the efforts of the National Security Agency and the National Institute of Standards and Technology to standardize message digest algorithms following earlier work on the MD4 and MD5 families by Ronald Rivest and the research outputs of institutions like MIT and RSA Laboratories. Published in 1993 in the Federal Information Processing Standards lineage, SHA-0 was incorporated into protocols and standards influenced by the U.S. Department of Defense and related agencies. Shortly after release, independent researchers including teams from Message Digest Research Group and university groups at CWI and Shandong University scrutinized the design, prompting the 1995 modification that produced SHA-1; this change coincided with broader public cryptanalysis exemplified by work from Shai Halevi, Avi Wigderson, and other theorists active at venues such as CRYPTO and Eurocrypt.
The algorithm processes messages in 512-bit blocks using a 160-bit internal state composed of five 32-bit words, reflecting a structure inspired by the MD4 family and the sponge of earlier constructs developed at RSA Laboratories and MIT. Each block undergoes 80 rounds of a non-linear compression function using bitwise operations, modular addition, and a message schedule derived from the current block words. The design uses functions similar to those studied by Ronald Rivest and other practitioners at RSA Data Security; it employs constants and boolean functions intended to provide diffusion across the five-word state. The original specification lacked a particular word-rotation step later introduced in SHA-1, making its message expansion and permutation more predictable under differential analysis techniques developed in academic work at Berkeley, Cambridge University, and Ecole Normale Supérieure.
Early cryptanalytic scrutiny demonstrated that the original design was susceptible to collision-finding methods more efficient than brute force, leveraging differential cryptanalysis approaches pioneered by researchers at IBM Research, CWI, and INRIA. Formal attacks exploited weaknesses in the message expansion, enabling collisions to be constructed with computational effort far below the theoretical 2^80 bound; these attacks were reported in conference proceedings at ASIACRYPT and CRYPTO and in journal venues linked to IEEE and ACM. The vulnerability motivated the prompt publication of SHA-1, which added an additional rotation in the message schedule; however, subsequent research by teams from Google, CWI, and universities such as Saarland University and University College London ultimately demonstrated practical collisions for SHA-1 as well. SHA-0 today is considered cryptographically broken for collision resistance and unsuitable for signature schemes standardized by bodies like IETF and ISO.
Implementations of the original algorithm appeared in early versions of software libraries used in government and commercial products influenced by standards from NIST and compliance frameworks associated with the U.S. Federal Government. Implementations were provided by vendors such as RSA Laboratories and appeared in open-source projects maintained by communities at GNU and repositories hosted by institutions like Berkeley Software Distribution. As cryptanalysis progressed, major projects and protocols specified migration paths to SHA-1 and later to the SHA-2 family; for example, cryptographic suites in software stacks like those from Microsoft, Apple Inc., and OpenSSL Project moved away from the original function. Today SHA-0 remains implemented primarily for historical study, test vectors in cryptographic textbooks published by houses like Springer and Wiley, and as an example case in courses taught at universities such as Stanford University and ETH Zurich.
Compared with SHA-1, the original function differs by the absence of a single left-rotation in the message schedule; this seemingly minor change reduces resistance to differential attacks analyzed by cryptographers at CWI and INRIA. SHA-1 added the rotation and became the interim standard until further weaknesses prompted adoption of the SHA-2 family (including variants standardized by NIST such as SHA-256 and SHA-512). The SHA-2 family, influenced by hash function research at institutions like NSA and NIST and implemented by vendors including Intel Corporation and AMD, uses larger state sizes and different compression structures to provide higher collision and preimage resistance targets than those achievable with SHA-0 or SHA-1. Standards bodies such as IETF, ISO, and FIPS now recommend SHA-2 or later constructions over the original algorithm for contemporary security requirements.