Bruce Schneier on hash functions, in the wake of the MD5 collisions: “there are rumors, unconfirmed at this writing, of results against SHA-1”. [via]
One thought on “”
Comments are closed.
Bruce Schneier on hash functions, in the wake of the MD5 collisions: “there are rumors, unconfirmed at this writing, of results against SHA-1”. [via]
Comments are closed.
From http://news.zdnet.co.uk/internet/security/0,39020375,39163876,00.htm :
“Biham reported some early work toward identifying vulnerabilities in the SHA-1 algorithm, which is believed to be secure.”
“The SHA-1 algorithm relies on a computer executing a routine 80 times in an attempt to create a unique fingerprint. Biham said that he had been able to duplicate the fingerprint for 36 of those 80 rounds.”
LikeLike