Secure Coding mailing list archives
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)
From: BlueBoar at thievco.com (Blue Boar)
Date: Wed, 21 Mar 2007 10:53:27 -0700
3APA3A wrote:
First, by reading 'crack' I thought lady can recover full message by it's signature. After careful reading she can bruteforce collisions 2000 times faster.
Cracking a hash would never mean recovering the full original message, except for possibly messages that were smaller than the number of bits in the hash value. There are an infinite number of messages that all hash to the same value. The best crack you can have for a hash is to be able collide with an existing hash value and be able to choose most of the message contents. BB
Current thread:
- Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Michael Silk (Mar 21)
- Message not available
- [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar (Mar 21)
- [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) der Mouse (Mar 21)
- Message not available
- [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar (Mar 21)
- Message not available
- [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar (Mar 21)
- [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar (Mar 21)
- Message not available