www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html

Preview meta tags from the www.schneier.com website.

Linked Hostnames

45

Search Engine Appearance

Google

https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html

Cryptanalysis of SHA-1 - Schneier on Security

On Tuesday, I blogged about a new cryptanalytic result—the first attack faster than brute-force against SHA-1. I wrote about SHA, and the need to replace it, last September. Aside from the details of the new attack, everything I said then still stands. I’ll quote from that article, adding new material where appropriate. One-way hash functions are a cryptographic construct used in many applications. They are used in conjunction with public-key algorithms for both encryption and digital signatures. They are used in integrity checking. They are used in authentication. They have all sorts of applications in a great many different protocols. Much more than encryption algorithms, one-way hash functions are the workhorses of modern cryptography...



Bing

Cryptanalysis of SHA-1 - Schneier on Security

https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html

On Tuesday, I blogged about a new cryptanalytic result—the first attack faster than brute-force against SHA-1. I wrote about SHA, and the need to replace it, last September. Aside from the details of the new attack, everything I said then still stands. I’ll quote from that article, adding new material where appropriate. One-way hash functions are a cryptographic construct used in many applications. They are used in conjunction with public-key algorithms for both encryption and digital signatures. They are used in integrity checking. They are used in authentication. They have all sorts of applications in a great many different protocols. Much more than encryption algorithms, one-way hash functions are the workhorses of modern cryptography...



DuckDuckGo

https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html

Cryptanalysis of SHA-1 - Schneier on Security

On Tuesday, I blogged about a new cryptanalytic result—the first attack faster than brute-force against SHA-1. I wrote about SHA, and the need to replace it, last September. Aside from the details of the new attack, everything I said then still stands. I’ll quote from that article, adding new material where appropriate. One-way hash functions are a cryptographic construct used in many applications. They are used in conjunction with public-key algorithms for both encryption and digital signatures. They are used in integrity checking. They are used in authentication. They have all sorts of applications in a great many different protocols. Much more than encryption algorithms, one-way hash functions are the workhorses of modern cryptography...

  • General Meta Tags

    8
    • title
      Cryptanalysis of SHA-1 - Schneier on Security
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • viewport
      width=device-width, initial-scale=1, user-scalable=no
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
  • Open Graph Meta Tags

    6
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      Cryptanalysis of SHA-1 - Schneier on Security
    • og:description
      On Tuesday, I blogged about a new cryptanalytic result—the first attack faster than brute-force against SHA-1. I wrote about SHA, and the need to replace it, last September. Aside from the details of the new attack, everything I said then still stands. I’ll quote from that article, adding new material where appropriate. One-way hash functions are a cryptographic construct used in many applications. They are used in conjunction with public-key algorithms for both encryption and digital signatures. They are used in integrity checking. They are used in authentication. They have all sorts of applications in a great many different protocols. Much more than encryption algorithms, one-way hash functions are the workhorses of modern cryptography...
    • og:url
      https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html
  • Twitter Meta Tags

    3
    • twitter:card
      summary_large_image
    • twitter:label1
      Est. reading time
    • twitter:data1
      6 minutes
  • Link Tags

    22
    • EditURI
      https://www.schneier.com/xmlrpc.php?rsd
    • alternate
      https://www.schneier.com/feed/
    • alternate
      https://www.schneier.com/comments/feed/
    • alternate
      https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html/feed/
    • alternate
      https://www.schneier.com/wp-json/wp/v2/posts/174

Links

224