www.schneier.com/blog/archives/2005/08/new_cryptanalyt.html

Preview meta tags from the www.schneier.com website.

Linked Hostnames

25

Search Engine Appearance

Google

https://www.schneier.com/blog/archives/2005/08/new_cryptanalyt.html

New Cryptanalytic Results Against SHA-1 - Schneier on Security

Xiaoyun Wang, one of the team of Chinese cryptographers that successfully broke SHA-0 and SHA-1, along with Andrew Yao and Frances Yao, announced new results against SHA-1 yesterday at Crypto’s rump session. (Actually, Adi Shamir announced the results in their name, since she and her student did not receive U.S. visas in time to attend the conference.) Shamir presented few details—and there’s no paper—but the time complexity of the new attack is 263. (Their previous result was 269; brute force is 280.) He did say that he expected Wang and her students to improve this result over the next few months. The modifications to their published attack are still new, and more improvements are likely over the next several months. There is no reason to believe that 2...



Bing

New Cryptanalytic Results Against SHA-1 - Schneier on Security

https://www.schneier.com/blog/archives/2005/08/new_cryptanalyt.html

Xiaoyun Wang, one of the team of Chinese cryptographers that successfully broke SHA-0 and SHA-1, along with Andrew Yao and Frances Yao, announced new results against SHA-1 yesterday at Crypto’s rump session. (Actually, Adi Shamir announced the results in their name, since she and her student did not receive U.S. visas in time to attend the conference.) Shamir presented few details—and there’s no paper—but the time complexity of the new attack is 263. (Their previous result was 269; brute force is 280.) He did say that he expected Wang and her students to improve this result over the next few months. The modifications to their published attack are still new, and more improvements are likely over the next several months. There is no reason to believe that 2...



DuckDuckGo

https://www.schneier.com/blog/archives/2005/08/new_cryptanalyt.html

New Cryptanalytic Results Against SHA-1 - Schneier on Security

Xiaoyun Wang, one of the team of Chinese cryptographers that successfully broke SHA-0 and SHA-1, along with Andrew Yao and Frances Yao, announced new results against SHA-1 yesterday at Crypto’s rump session. (Actually, Adi Shamir announced the results in their name, since she and her student did not receive U.S. visas in time to attend the conference.) Shamir presented few details—and there’s no paper—but the time complexity of the new attack is 263. (Their previous result was 269; brute force is 280.) He did say that he expected Wang and her students to improve this result over the next few months. The modifications to their published attack are still new, and more improvements are likely over the next several months. There is no reason to believe that 2...

  • General Meta Tags

    8
    • title
      New Cryptanalytic Results Against SHA-1 - Schneier on Security
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • viewport
      width=device-width, initial-scale=1, user-scalable=no
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
  • Open Graph Meta Tags

    6
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      New Cryptanalytic Results Against SHA-1 - Schneier on Security
    • og:description
      Xiaoyun Wang, one of the team of Chinese cryptographers that successfully broke SHA-0 and SHA-1, along with Andrew Yao and Frances Yao, announced new results against SHA-1 yesterday at Crypto’s rump session. (Actually, Adi Shamir announced the results in their name, since she and her student did not receive U.S. visas in time to attend the conference.) Shamir presented few details—and there’s no paper—but the time complexity of the new attack is 263. (Their previous result was 269; brute force is 280.) He did say that he expected Wang and her students to improve this result over the next few months. The modifications to their published attack are still new, and more improvements are likely over the next several months. There is no reason to believe that 2...
    • og:url
      https://www.schneier.com/blog/archives/2005/08/new_cryptanalyt.html
  • Twitter Meta Tags

    3
    • twitter:card
      summary_large_image
    • twitter:label1
      Est. reading time
    • twitter:data1
      2 minutes
  • Link Tags

    22
    • EditURI
      https://www.schneier.com/xmlrpc.php?rsd
    • alternate
      https://www.schneier.com/feed/
    • alternate
      https://www.schneier.com/comments/feed/
    • alternate
      https://www.schneier.com/blog/archives/2005/08/new_cryptanalyt.html/feed/
    • alternate
      https://www.schneier.com/wp-json/wp/v2/posts/426

Links

166