
www.schneier.com/blog/archives/2005/02/sha1_broken.html
Preview meta tags from the www.schneier.com website.
Linked Hostnames
61- 209 links towww.schneier.com
- 2 links toeprint.iacr.org
- 2 links towww.eff.org
- 2 links towww.maradns.org
- 2 links towww.unixwiz.net
- 1 link todavi.poetry.org
- 1 link toduckduckgo.com
- 1 link toepic.org
Search Engine Appearance
SHA-1 Broken - Schneier on Security
SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing. The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results: collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length. collisions in SHA-0 in 2**39 operations. collisions in 58-round SHA-1 in 2**33 operations. This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn’t affect applications such as HMAC where collisions aren’t important)...
Bing
SHA-1 Broken - Schneier on Security
SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing. The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results: collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length. collisions in SHA-0 in 2**39 operations. collisions in 58-round SHA-1 in 2**33 operations. This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn’t affect applications such as HMAC where collisions aren’t important)...
DuckDuckGo

SHA-1 Broken - Schneier on Security
SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing. The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results: collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length. collisions in SHA-0 in 2**39 operations. collisions in 58-round SHA-1 in 2**33 operations. This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn’t affect applications such as HMAC where collisions aren’t important)...
General Meta Tags
8- titleSHA-1 Broken - Schneier on Security
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1, user-scalable=no
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
Open Graph Meta Tags
6og:locale
en_US- og:typearticle
- og:titleSHA-1 Broken - Schneier on Security
- og:descriptionSHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing. The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results: collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length. collisions in SHA-0 in 2**39 operations. collisions in 58-round SHA-1 in 2**33 operations. This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn’t affect applications such as HMAC where collisions aren’t important)...
- og:urlhttps://www.schneier.com/blog/archives/2005/02/sha1_broken.html
Twitter Meta Tags
3- twitter:cardsummary_large_image
- twitter:label1Est. reading time
- twitter:data11 minute
Link Tags
22- EditURIhttps://www.schneier.com/xmlrpc.php?rsd
- alternatehttps://www.schneier.com/feed/
- alternatehttps://www.schneier.com/comments/feed/
- alternatehttps://www.schneier.com/blog/archives/2005/02/sha1_broken.html/feed/
- alternatehttps://www.schneier.com/wp-json/wp/v2/posts/59365
Links
273- http://davi.poetry.org
- http://eprint.iacr.org/2004/199
- http://eprint.iacr.org/2004/199.pdf
- http://geminisecurity.com
- http://gold.blog555.net