[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Fenfire-dev] Fwd: [p2p-hackers] SHA1 broken?

From: Benja Fallenstein
Subject: [Fenfire-dev] Fwd: [p2p-hackers] SHA1 broken?
Date: Wed, 16 Feb 2005 07:44:13 +0100

---------- Forwarded message ----------
From: Gordon Mohr (@ Bitzi) <address@hidden>
Date: Tue, 15 Feb 2005 21:41:05 -0800
Subject: [p2p-hackers] SHA1 broken?
To: p2p-hackers <address@hidden>

Via Slashdot, as reported by Bruce Schneier:


Schneier writes:

#   SHA-1 Broken
# SHA-1 has been broken. Not a reduced-round version. Not a
# simplified version. The real thing.
# The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu
# (mostly from Shandong University in China) have been quietly
# circulating a paper announcing their results:
#   * collisions in the the full SHA-1 in 2**69 hash operations,
#     much less than the brute-force attack of 2**80 operations
#     based on the hash length.
#   * collisions in SHA-0 in 2**39 operations.
#   * collisions in 58-round SHA-1 in 2**33 operations.
# This attack builds on previous attacks on SHA-0 and SHA-1, and
# is a major, major cryptanalytic result. It pretty much puts a
# bullet into SHA-1 as a hash function for digital signatures
# (although it doesn't affect applications such as HMAC where
# collisions aren't important).
# The paper isn't generally available yet. At this point I can't
# tell if the attack is real, but the paper looks good and this
# is a reputable research team.
# More details when I have them.

- Gordon @ Bitzi
p2p-hackers mailing list
Here is a web page listing P2P Conferences:

reply via email to

[Prev in Thread] Current Thread [Next in Thread]