SHA-1 cracked

Ian G iang at systemics.com
Thu Feb 17 10:28:29 EST 2005


John Kelsey wrote:

>Anyone know where we could find the paper?  It'd be kind-of convenient when trying to assess the impact of the attack if we knew at least a few details....
>  
>

The *words* part I typed in here:

http://www.financialcryptography.com/mt/archives/000357.html

I skipped the examples.  It is very brief.

>If it's really the case that the attack requires colliding messages of different sizes (that's what this comment implies), then maybe the attack won't be applicable in the real world, but it's hard to be sure of that.  Suppose I can find collisions of the form (X,X*) where X is three blocks long, and X* is four blocks long.  Now, that won't work as a full collision,  because the length padding at the end will change for X and X*.  But I can find two such collisions, and still get a working attack by concatenating them.  
>  
>

This is the relevant para:

"Table 2: A collision of SHA1 reduced to 58 steps. The two messages that 
collide are M0 and M'0. Note that padding rules were not applied to the 
messages."



iang

-- 
News and views on what matters in finance+crypto:
        http://financialcryptography.com/


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list