In cryptography, SHA-1 is a cryptographically broken but still widely used hash function which takes an input and produces a 160-bit hash value known as a message digest – typically rendered as 40 hexadecimal digits.
FactSnippet No. 1,602,459 |
In cryptography, SHA-1 is a cryptographically broken but still widely used hash function which takes an input and produces a 160-bit hash value known as a message digest – typically rendered as 40 hexadecimal digits.
FactSnippet No. 1,602,459 |
Since 2005, SHA-1 has not been considered secure against well-funded opponents; as of 2010 many organizations have recommended its replacement.
FactSnippet No. 1,602,460 |
SHA-1 was developed as part of the US Government's Capstone project.
FactSnippet No. 1,602,464 |
SHA-1, which has a 160-bit message digest, was originally thought to have 80-bit strength.
FactSnippet No. 1,602,465 |
On 17 August 2005, an improvement on the SHA-1 attack was announced on behalf of Xiaoyun Wang, Andrew Yao and Frances Yao at the CRYPTO 2005 Rump Session, lowering the complexity required for finding a collision in SHA-1 to 2.
FactSnippet No. 1,602,466 |
Christophe De Canniere and Christian Rechberger further improved the attack on SHA-1 in "Finding SHA-1 Characteristics: General Results and Applications, " receiving the Best Paper Award at ASIACRYPT 2006.
FactSnippet No. 1,602,467 |
On 8 November 2010, he claimed he had a fully working near-collision attack against full SHA-1 working with an estimated complexity equivalent to 2 SHA-1 compressions.
FactSnippet No. 1,602,468 |
SHA-1 estimated this attack could be extended to a full collision with a complexity around 2.
FactSnippet No. 1,602,469 |
In particular, it was the first time that an attack on full SHA-1 had been demonstrated; all earlier attacks were too expensive for their authors to carry them out.
FactSnippet No. 1,602,470 |