Paul Rubin <http://[EMAIL PROTECTED]> wrote:
> 
> FYI.
> >From <http://www.schneier.com/blog/archives/2005/02/sha1_broken.html>:
> 
>     The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu
>     (mostly from Shandong University in China) have been quietly
>     circulating a paper announcing their results:
> 
>         * collisions in the the full SHA-1 in 2**69 hash operations, 
> much
>           less than the brute-force attack of 2**80 operations based on
>           the hash length.
> 
>         * collisions in SHA-0 in 2**39 operations.
> 
>         * collisions in 58-round SHA-1 in 2**33 operations.
>         ...
> 
> This is the same group that broke MD5 a few months ago and so this is
> probably real.  It doesn't immediately turn everyone's applications
> inseecure (2**69 operations is still more than the 2**64 operations
> that it takes to break MD5 by brute force) and if it's like the MD5
> result, finds only free rather than targeted collisions.  So don't 
> panic.

Also, the new findings only apply to hash collisions, not to the invertibility 
of SHA1 
hashes - thus, as Schneier points out, uses of keyed hashes (such as HMAC) are 
not 
compromised by this.

Tim C

-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to