Difference between revisions of "SHA-1"

From ForensicsWiki
Jump to: navigation, search
(clarify FIPS)
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
SHA-1 ('''S'''ecure '''H'''ash '''A'''lgorithm) is a cryptographic hash function that was first published in 1995 in FIPS PUB 180-1 by the NSA as a fix to a flaw found in SHA-0.
+
'''SHA-1''' ('''S'''ecure '''H'''ash '''A'''lgorithm) is a cryptographic hash function that was first published in 1995 in Federal Information Processing Standards (FIPS) PUB 180-1 by the National Security Agency (NSA) as a fix to an unknown flaw found in SHA-0.
  
In February of 2005 an attack was announced that could find collusions in SHA-1 requiring fewer than 2<sup>69</sup> operations.
+
In February of 2005 an attack was announced that could find collisions in SHA-1 requiring fewer than 2<sup>69</sup> operations.
  
 
== Tools ==
 
== Tools ==
  
On most Unix systems the tool sha1 can be used to compute the SHA-1 hash of a file or devices.
+
On most Unix systems the tool sha1sum can be used to compute the SHA-1 hash of a file or devices.
 
+
  
 
== External Links ==
 
== External Links ==
 
* [ftp://ftp.rfc-editor.org/in-notes/rfc3174.txt RFC 3174]
 
* [ftp://ftp.rfc-editor.org/in-notes/rfc3174.txt RFC 3174]
 +
 +
[[Category:Hashing]]

Latest revision as of 09:32, 6 October 2009

SHA-1 (Secure Hash Algorithm) is a cryptographic hash function that was first published in 1995 in Federal Information Processing Standards (FIPS) PUB 180-1 by the National Security Agency (NSA) as a fix to an unknown flaw found in SHA-0.

In February of 2005 an attack was announced that could find collisions in SHA-1 requiring fewer than 269 operations.

Tools

On most Unix systems the tool sha1sum can be used to compute the SHA-1 hash of a file or devices.

External Links