[16919] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: SHA-1 cracked

daemon@ATHENA.MIT.EDU (John Kelsey)
Thu Feb 17 07:59:01 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 16 Feb 2005 12:48:32 -0500 (GMT-05:00)
From: John Kelsey <kelsey.j@ix.netcom.com>
Reply-To: John Kelsey <kelsey.j@ix.netcom.com>
To: "Steven M. Bellovin" <smb@cs.columbia.edu>,
	cryptography@metzdowd.com

>From: "Steven M. Bellovin" <smb@cs.columbia.edu>
>Sent: Feb 15, 2005 11:29 PM
>To: cryptography@metzdowd.com
>Subject: SHA-1 cracked

>According to Bruce Schneier's blog 
>(http://www.schneier.com/blog/archives/2005/02/sha1_broken.html), a 
>team has found collisions in full SHA-1.  It's probably not a practical 
>threat today, since it takes 2^69 operations to do it and we haven't 
>heard claims that NSA et al. have built massively parallel hash 
>function collision finders, but it's an impressive achievement 
>nevertheless -- especially since it comes just a week after NIST stated 
>that there were no successful attacks on SHA-1.

Well, there *weren't* any a week ago....

>		--Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb

--John Kelsey


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post