Difference between revisions of "SHA-1"

From ForensicsWiki
Jump to: navigation, search
m
(clarify FIPS)
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
'''SHA-1''' ('''S'''ecure '''H'''ash '''A'''lgorithm) is a cryptographic hash function that was first published in 1995 in FIPS PUB 180-1 by the NSA as a fix to an unknown flaw found in SHA-0.
+
'''SHA-1''' ('''S'''ecure '''H'''ash '''A'''lgorithm) is a cryptographic hash function that was first published in 1995 in Federal Information Processing Standards (FIPS) PUB 180-1 by the National Security Agency (NSA) as a fix to an unknown flaw found in SHA-0.
  
 
In February of 2005 an attack was announced that could find collisions in SHA-1 requiring fewer than 2<sup>69</sup> operations.
 
In February of 2005 an attack was announced that could find collisions in SHA-1 requiring fewer than 2<sup>69</sup> operations.
Line 5: Line 5:
 
== Tools ==
 
== Tools ==
  
On most Unix systems the tool sha1 can be used to compute the SHA-1 hash of a file or devices.
+
On most Unix systems the tool sha1sum can be used to compute the SHA-1 hash of a file or devices.
  
 
== External Links ==
 
== External Links ==

Latest revision as of 10:32, 6 October 2009

SHA-1 (Secure Hash Algorithm) is a cryptographic hash function that was first published in 1995 in Federal Information Processing Standards (FIPS) PUB 180-1 by the National Security Agency (NSA) as a fix to an unknown flaw found in SHA-0.

In February of 2005 an attack was announced that could find collisions in SHA-1 requiring fewer than 269 operations.

Tools

On most Unix systems the tool sha1sum can be used to compute the SHA-1 hash of a file or devices.

External Links