Difference between revisions of "SHA-1"

From Forensics Wiki
Jump to: navigation, search
(New page: SHA-1 ('''S'''ecure '''H'''ash '''A'''lgorithm) is a cryptographic hash function that was first published in 1995 in FIPS PUB 180-1 by the NSA as a fix to a flaw found in SHA-0. In Februa...)
 
Line 2: Line 2:
  
 
In February of 2005 an attack was announced that could find collusions in SHA-1 requiring fewer than 2<sup>69</sup> operations.
 
In February of 2005 an attack was announced that could find collusions in SHA-1 requiring fewer than 2<sup>69</sup> operations.
 +
 +
== Tools ==
 +
 +
On most Unix systems the tool sha1 can be used to compute the SHA-1 hash of a file or devices.
  
  
 
== External Links ==
 
== External Links ==
 
* [ftp://ftp.rfc-editor.org/in-notes/rfc3174.txt RFC 3174]
 
* [ftp://ftp.rfc-editor.org/in-notes/rfc3174.txt RFC 3174]

Revision as of 13:27, 3 August 2007

SHA-1 (Secure Hash Algorithm) is a cryptographic hash function that was first published in 1995 in FIPS PUB 180-1 by the NSA as a fix to a flaw found in SHA-0.

In February of 2005 an attack was announced that could find collusions in SHA-1 requiring fewer than 269 operations.

Tools

On most Unix systems the tool sha1 can be used to compute the SHA-1 hash of a file or devices.


External Links