[Cryptography] Google announces practical SHA-1 collision attack

Mark Steward marksteward at gmail.com
Wed Mar 1 13:29:09 EST 2017


On Wed, Mar 1, 2017 at 5:53 PM, Phillip Hallam-Baker <phill at hallambaker.com>
wrote:

> We do not know the full attack yet. But I suggest that reading between the
> lines in the release we will find that it involves finding a weak point
> where the planets align and the SHA-1 internal state collapses to a small
> work factor and then looking for an exploit for that weak point.
>
> It is very likely that finding a second exploit for the same weak point
> requires only the 110 GPU hours...
>
>
We do, it's all in the report and referenced papers.

Performing the 110 GPU hours stage again might give you a different-looking
second block, but wouldn't change the chosen prefix or first block. The
non-linear path sounds like what you're referring to, and is dependent on
input.


Mark
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20170301/5a32f619/attachment.html>


More information about the cryptography mailing list