| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
X-Original-To: cryptography@metzdowd.com X-Original-To: cryptography@metzdowd.com Date: Wed, 16 Feb 2005 12:48:32 -0500 (GMT-05:00) From: John Kelsey <kelsey.j@ix.netcom.com> Reply-To: John Kelsey <kelsey.j@ix.netcom.com> To: "Steven M. Bellovin" <smb@cs.columbia.edu>, cryptography@metzdowd.com >From: "Steven M. Bellovin" <smb@cs.columbia.edu> >Sent: Feb 15, 2005 11:29 PM >To: cryptography@metzdowd.com >Subject: SHA-1 cracked >According to Bruce Schneier's blog >(http://www.schneier.com/blog/archives/2005/02/sha1_broken.html), a >team has found collisions in full SHA-1. It's probably not a practical >threat today, since it takes 2^69 operations to do it and we haven't >heard claims that NSA et al. have built massively parallel hash >function collision finders, but it's an impressive achievement >nevertheless -- especially since it comes just a week after NIST stated >that there were no successful attacks on SHA-1. Well, there *weren't* any a week ago.... > --Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb --John Kelsey --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com
| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |