Differential Path for SHA-1 with complexity O(2^52)

An International Association for Cryptologic Research paper on SHA-1 theoretical weakness. by Cameron McDonald, and Josef Pieprzyk, Centre for Advanced Computing, Algorithms and Cryptography Department of Computing, Macquarie University Philip Hawkes, Qualcomm Australia, Level 3, 77 King St, Sydney 2000, Australia Abstract: although SHA-1 has been theoretically broken for some time now, the task of … Continue reading Differential Path for SHA-1 with complexity O(2^52)