Difference between pages "Open WebMail Header Format" and "SHA-1"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(New page: <pre> From: "Username" <username@sendinghost.com> To: "Username" <username@receivinghost.com> Subject: Header test Date: Thu, 2 Aug 2007 20:54:36 +0400 Message-Id: <20070802165414.M43479@s...)
 
m
 
Line 1: Line 1:
<pre>
+
'''SHA-1''' ('''S'''ecure '''H'''ash '''A'''lgorithm) is a cryptographic hash function that was first published in 1995 in FIPS PUB 180-1 by the NSA as a fix to an unknown flaw found in SHA-0.
From: "Username" <username@sendinghost.com>
+
To: "Username" <username@receivinghost.com>
+
Subject: Header test
+
Date: Thu, 2 Aug 2007 20:54:36 +0400
+
Message-Id: <20070802165414.M43479@sendinghost.com>
+
X-Mailer: Open WebMail 2.50 20050106
+
X-OriginatingIP: 255.255.255.255 (username@sendinghost.com)
+
MIME-Version: 1.0
+
Content-Type: text/plain; charset=koi8-r
+
</pre>
+
  
Message-ID format:
+
In February of 2005 an attack was announced that could find collisions in SHA-1 requiring fewer than 2<sup>69</sup> operations.
<pre>
+
 
openwebmail/openwebmail-tool.pl
+
== Tools ==
  # fake a messageid for this message
+
 
  my $fakedid = ow::datetime::gmtime2dateserial().'.M'.int(rand()*100000);
+
On most Unix systems the tool sha1 can be used to compute the SHA-1 hash of a file or devices.
  $fakedid="<$fakedid".'@'."${$config{'domainnames'}}[0]>";
+
 
</pre>
+
== External Links ==
 +
* [ftp://ftp.rfc-editor.org/in-notes/rfc3174.txt RFC 3174]
 +
 
 +
[[Category:Hashing]]

Revision as of 14:17, 5 September 2008

SHA-1 (Secure Hash Algorithm) is a cryptographic hash function that was first published in 1995 in FIPS PUB 180-1 by the NSA as a fix to an unknown flaw found in SHA-0.

In February of 2005 an attack was announced that could find collisions in SHA-1 requiring fewer than 269 operations.

Tools

On most Unix systems the tool sha1 can be used to compute the SHA-1 hash of a file or devices.

External Links