Difference between revisions of "SHA-1"

From ForensicsWiki
Jump to: navigation, search
m
Line 1: Line 1:
SHA-1 ('''S'''ecure '''H'''ash '''A'''lgorithm) is a cryptographic hash function that was first published in 1995 in FIPS PUB 180-1 by the NSA as a fix to a flaw found in SHA-0.
+
'''SHA-1''' ('''S'''ecure '''H'''ash '''A'''lgorithm) is a cryptographic hash function that was first published in 1995 in FIPS PUB 180-1 by the NSA as a fix to an unknown flaw found in SHA-0.
  
In February of 2005 an attack was announced that could find collusions in SHA-1 requiring fewer than 2<sup>69</sup> operations.
+
In February of 2005 an attack was announced that could find collisions in SHA-1 requiring fewer than 2<sup>69</sup> operations.
  
 
== Tools ==
 
== Tools ==
  
 
On most Unix systems the tool sha1 can be used to compute the SHA-1 hash of a file or devices.
 
On most Unix systems the tool sha1 can be used to compute the SHA-1 hash of a file or devices.
 
  
 
== External Links ==
 
== External Links ==
 
* [ftp://ftp.rfc-editor.org/in-notes/rfc3174.txt RFC 3174]
 
* [ftp://ftp.rfc-editor.org/in-notes/rfc3174.txt RFC 3174]
 +
 +
[[Category:Hashing]]

Revision as of 15:17, 5 September 2008

SHA-1 (Secure Hash Algorithm) is a cryptographic hash function that was first published in 1995 in FIPS PUB 180-1 by the NSA as a fix to an unknown flaw found in SHA-0.

In February of 2005 an attack was announced that could find collisions in SHA-1 requiring fewer than 269 operations.

Tools

On most Unix systems the tool sha1 can be used to compute the SHA-1 hash of a file or devices.

External Links