
www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html
Preview meta tags from the www.schneier.com website.
Linked Hostnames
45- 177 links towww.schneier.com
- 3 links towww.eff.org
- 2 links towww.nist.gov
- 1 link tobillpg.me.uk
- 1 link toblog.raschi.de
- 1 link tocryptopp.sourceforge.net
- 1 link tocsrc.nist.gov
- 1 link tocv.arnists.com
Search Engine Appearance
Cryptanalysis of SHA-1 - Schneier on Security
On Tuesday, I blogged about a new cryptanalytic result—the first attack faster than brute-force against SHA-1. I wrote about SHA, and the need to replace it, last September. Aside from the details of the new attack, everything I said then still stands. I’ll quote from that article, adding new material where appropriate. One-way hash functions are a cryptographic construct used in many applications. They are used in conjunction with public-key algorithms for both encryption and digital signatures. They are used in integrity checking. They are used in authentication. They have all sorts of applications in a great many different protocols. Much more than encryption algorithms, one-way hash functions are the workhorses of modern cryptography...
Bing
Cryptanalysis of SHA-1 - Schneier on Security
On Tuesday, I blogged about a new cryptanalytic result—the first attack faster than brute-force against SHA-1. I wrote about SHA, and the need to replace it, last September. Aside from the details of the new attack, everything I said then still stands. I’ll quote from that article, adding new material where appropriate. One-way hash functions are a cryptographic construct used in many applications. They are used in conjunction with public-key algorithms for both encryption and digital signatures. They are used in integrity checking. They are used in authentication. They have all sorts of applications in a great many different protocols. Much more than encryption algorithms, one-way hash functions are the workhorses of modern cryptography...
DuckDuckGo

Cryptanalysis of SHA-1 - Schneier on Security
On Tuesday, I blogged about a new cryptanalytic result—the first attack faster than brute-force against SHA-1. I wrote about SHA, and the need to replace it, last September. Aside from the details of the new attack, everything I said then still stands. I’ll quote from that article, adding new material where appropriate. One-way hash functions are a cryptographic construct used in many applications. They are used in conjunction with public-key algorithms for both encryption and digital signatures. They are used in integrity checking. They are used in authentication. They have all sorts of applications in a great many different protocols. Much more than encryption algorithms, one-way hash functions are the workhorses of modern cryptography...
General Meta Tags
8- titleCryptanalysis of SHA-1 - Schneier on Security
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1, user-scalable=no
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
Open Graph Meta Tags
6og:locale
en_US- og:typearticle
- og:titleCryptanalysis of SHA-1 - Schneier on Security
- og:descriptionOn Tuesday, I blogged about a new cryptanalytic result—the first attack faster than brute-force against SHA-1. I wrote about SHA, and the need to replace it, last September. Aside from the details of the new attack, everything I said then still stands. I’ll quote from that article, adding new material where appropriate. One-way hash functions are a cryptographic construct used in many applications. They are used in conjunction with public-key algorithms for both encryption and digital signatures. They are used in integrity checking. They are used in authentication. They have all sorts of applications in a great many different protocols. Much more than encryption algorithms, one-way hash functions are the workhorses of modern cryptography...
- og:urlhttps://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html
Twitter Meta Tags
3- twitter:cardsummary_large_image
- twitter:label1Est. reading time
- twitter:data16 minutes
Link Tags
22- EditURIhttps://www.schneier.com/xmlrpc.php?rsd
- alternatehttps://www.schneier.com/feed/
- alternatehttps://www.schneier.com/comments/feed/
- alternatehttps://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html/feed/
- alternatehttps://www.schneier.com/wp-json/wp/v2/posts/174
Links
224- http://billpg.me.uk
- http://blog.raschi.de
- http://cryptopp.sourceforge.net/docs/ref521
- http://csrc.nist.gov/CryptoToolkit/tkhash.html
- http://cv.arnists.com