Toon posts:

SHA-1 gekraakt

Pagina: 1
Acties:
  • 56 views sinds 30-01-2008

Verwijderd

Topicstarter
Volgens de weblog http://www.schneier.com/blog/ is het hashing algoritme van SHA-1 gekraakt

Van de blog:

SHA-1 Broken

SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing.

The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results:

* collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length.

* collisions in SHA-0 in 2**39 operations.

* collisions in 58-round SHA-1 in 2**33 operations.

This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn't affect applications such as HMAC where collisions aren't important).

The paper isn't generally available yet. At this point I can't tell if the attack is real, but the paper looks good and this is a reputable research team.

More details when I have them.

Verwijderd

Geweldig nu nog even het discussie onderwerp.

  • Confusion
  • Registratie: April 2001
  • Laatst online: 01-03-2024

Confusion

Fallen from grace

Deze post heeft niets in W&L te zoeken. Lees alsjeblieft het beleid er even op na.

Ennu Seekless, dat had je in een TR moeten melden. Zie ook het Mededelingentopic over zinloze replies.

Wie trösten wir uns, die Mörder aller Mörder?


Dit topic is gesloten.