Page All:
Page 1
NIST is now unhappy about the SHA-1 vulnerability being shown over and over. They want a better hash and are inviting people to do it. Hashes and most crypto technologies will always be cracked eventually.
NIST is now unhappy about the SHA-1 vulnerability being shown over and over. They want a better hash and are inviting people to do it. Hashes and most crypto technologies will always be cracked eventually.
Quote
Due to recent attacks on the SHA-1 hash function specified in FIPS 180-2 , Secure Hash Standard, NIST is initiating an effort to develop one or more additional hash algorithms through a public competition, similar to the development process for the Advanced Encryption Standard (AES). Two workshops (see menu at left) have been held to assess the status of the NIST-approved hash functions, to discuss possible near- and long-term options, and to discuss hash function research in preparation for launching such a competition. In addition, NIST has published its policy on the use of the current hash functions, and has proposed a tentative timeline for the competition.