www.schneier.com/blog/archives/2005/02/sha1_broken.html

Preview meta tags from the www.schneier.com website.

Linked Hostnames

61

Search Engine Appearance

Google

https://www.schneier.com/blog/archives/2005/02/sha1_broken.html

SHA-1 Broken - Schneier on Security

SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing. The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results: collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length. collisions in SHA-0 in 2**39 operations. collisions in 58-round SHA-1 in 2**33 operations. This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn’t affect applications such as HMAC where collisions aren’t important)...



Bing

SHA-1 Broken - Schneier on Security

https://www.schneier.com/blog/archives/2005/02/sha1_broken.html

SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing. The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results: collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length. collisions in SHA-0 in 2**39 operations. collisions in 58-round SHA-1 in 2**33 operations. This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn’t affect applications such as HMAC where collisions aren’t important)...



DuckDuckGo

https://www.schneier.com/blog/archives/2005/02/sha1_broken.html

SHA-1 Broken - Schneier on Security

SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing. The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results: collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length. collisions in SHA-0 in 2**39 operations. collisions in 58-round SHA-1 in 2**33 operations. This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn’t affect applications such as HMAC where collisions aren’t important)...

  • General Meta Tags

    8
    • title
      SHA-1 Broken - Schneier on Security
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • viewport
      width=device-width, initial-scale=1, user-scalable=no
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
  • Open Graph Meta Tags

    6
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      SHA-1 Broken - Schneier on Security
    • og:description
      SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing. The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results: collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length. collisions in SHA-0 in 2**39 operations. collisions in 58-round SHA-1 in 2**33 operations. This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn’t affect applications such as HMAC where collisions aren’t important)...
    • og:url
      https://www.schneier.com/blog/archives/2005/02/sha1_broken.html
  • Twitter Meta Tags

    3
    • twitter:card
      summary_large_image
    • twitter:label1
      Est. reading time
    • twitter:data1
      1 minute
  • Link Tags

    22
    • EditURI
      https://www.schneier.com/xmlrpc.php?rsd
    • alternate
      https://www.schneier.com/feed/
    • alternate
      https://www.schneier.com/comments/feed/
    • alternate
      https://www.schneier.com/blog/archives/2005/02/sha1_broken.html/feed/
    • alternate
      https://www.schneier.com/wp-json/wp/v2/posts/59365

Links

273