ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.

Difference between pages "Open WebMail Header Format" and "SHA-1"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(New page: <pre> From: "Username" <username@sendinghost.com> To: "Username" <username@receivinghost.com> Subject: Header test Date: Thu, 2 Aug 2007 20:54:36 +0400 Message-Id: <20070802165414.M43479@s...)
 
m
 
Line 1: Line 1:
<pre>
+
'''SHA-1''' ('''S'''ecure '''H'''ash '''A'''lgorithm) is a cryptographic hash function that was first published in 1995 in FIPS PUB 180-1 by the NSA as a fix to an unknown flaw found in SHA-0.
From: "Username" <username@sendinghost.com>
+
To: "Username" <username@receivinghost.com>
+
Subject: Header test
+
Date: Thu, 2 Aug 2007 20:54:36 +0400
+
Message-Id: <20070802165414.M43479@sendinghost.com>
+
X-Mailer: Open WebMail 2.50 20050106
+
X-OriginatingIP: 255.255.255.255 (username@sendinghost.com)
+
MIME-Version: 1.0
+
Content-Type: text/plain; charset=koi8-r
+
</pre>
+
  
Message-ID format:
+
In February of 2005 an attack was announced that could find collisions in SHA-1 requiring fewer than 2<sup>69</sup> operations.
<pre>
+
 
openwebmail/openwebmail-tool.pl
+
== Tools ==
  # fake a messageid for this message
+
 
  my $fakedid = ow::datetime::gmtime2dateserial().'.M'.int(rand()*100000);
+
On most Unix systems the tool sha1 can be used to compute the SHA-1 hash of a file or devices.
  $fakedid="<$fakedid".'@'."${$config{'domainnames'}}[0]>";
+
 
</pre>
+
== External Links ==
 +
* [ftp://ftp.rfc-editor.org/in-notes/rfc3174.txt RFC 3174]
 +
 
 +
[[Category:Hashing]]

Revision as of 19:17, 5 September 2008

SHA-1 (Secure Hash Algorithm) is a cryptographic hash function that was first published in 1995 in FIPS PUB 180-1 by the NSA as a fix to an unknown flaw found in SHA-0.

In February of 2005 an attack was announced that could find collisions in SHA-1 requiring fewer than 269 operations.

Tools

On most Unix systems the tool sha1 can be used to compute the SHA-1 hash of a file or devices.

External Links