An International Association for Cryptologic Research paper on SHA-1 theoretical weakness.
by Cameron McDonald, and Josef Pieprzyk, Centre for Advanced Computing, Algorithms and Cryptography Department of Computing, Macquarie University
Philip Hawkes, Qualcomm Australia, Level 3, 77 King St, Sydney 2000, Australia
Abstract: although SHA-1 has been theoretically broken for some time now, the task of finding a practical collision is yet to be completed. Using some new approaches to differential analysis, we were able to find a new differential path which can be used in a collision attack with complexity of O(2 ^52). This is currently the lowest complexity attack on SHA-1.
Download from the original website
Possibly Related Posts:
- La presenza di truppe cinesi in Ucraina è un rischio per la cybersecurity europea?
- Adesso è scontro tra Apple e Londra sull’accesso ai dati dei cittadini. Perché è importante
- La resa di Apple al governo inglese rimette in discussione il senso dei servizi cloud?
- Paragon e Meta: lo spettro della sorveglianza e il fantasma della democrazia
- Perché Apple ha ritirato la causa contro la società israeliana dietro lo spyware Pegasus?