An International Association for Cryptologic Research paper on SHA-1 theoretical weakness.
by Cameron McDonald, and Josef Pieprzyk, Centre for Advanced Computing, Algorithms and Cryptography Department of Computing, Macquarie University
Philip Hawkes, Qualcomm Australia, Level 3, 77 King St, Sydney 2000, Australia
Abstract: although SHA-1 has been theoretically broken for some time now, the task of ﬁnding a practical collision is yet to be completed. Using some new approaches to differential analysis, we were able to ﬁnd a new differential path which can be used in a collision attack with complexity of O(2 ^52). This is currently the lowest complexity attack on SHA-1.
Possibly Related Posts:
- Un estratto da Codici Nascosti
- Digitanomalie. Domicilio digitale ed ennesima firma elettronica. L’AgID mette in pericolo i diritti dei cittadini?
- La firma digitale e gli “strumenti scrittori” volatili della Cassazione
- Spid bocciato perché la nostra identità richiede maggiori garanzie
- Attentati a Bruxelles, viva la privacy se la cyber intelligence fallisce