{"id":73,"date":"2005-02-20T03:40:49","date_gmt":"2005-02-20T03:40:49","guid":{"rendered":"https:\/\/www.suramya.com\/blog\/archives\/74-guid.html"},"modified":"2005-08-18T22:57:24","modified_gmt":"2005-08-19T02:57:24","slug":"sha-1-broken-by-crytography-team","status":"publish","type":"post","link":"https:\/\/www.suramya.com\/blog\/2005\/02\/sha-1-broken-by-crytography-team\/","title":{"rendered":"SHA-1 Broken by Crytography Team"},"content":{"rendered":"<p>I was catching up on all my unread email when I saw an email telling Bugtraq on how the SHA-1 encryption algorithim has been broken by a research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China). These guys have published a semi-private paper describing how they broke the crypto.<\/p>\n<p>Now that even this algorithim is broken, we have to move to a new hash function that is harder to break. The National Institute of Standards and Technology (NIST) already has standards for harder-to-break hash functions: SHA-224, SHA-256, SHA-384 and SHA-512. They&#8217;re already part of government standards and can be used. Though I don&#8217;t know how fast people with switch to the new hashes.<\/p>\n<p>A pretty good introduction to secure hashes is available <a href=\"http:\/\/www.unixwiz.net\/techtips\/iguide-crypto-hashes.html\">here<\/a> to help put all this in context. <\/p>\n<p>Original Story: <a href=\"http:\/\/www.schneier.com\/blog\/archives\/2005\/02\/sha1_broken.html\">SHA-1 Broken, Schneier.com<\/a><\/p>\n<p>&#8211; Suramya<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was catching up on all my unread email when I saw an email telling Bugtraq on how the SHA-1 encryption algorithim has been broken by a research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China). These guys have published a semi-private paper describing how they broke [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"","activitypub_status":"","footnotes":""},"categories":[6],"tags":[],"class_list":["post-73","post","type-post","status-publish","format-standard","hentry","category-computer-related"],"_links":{"self":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/73","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/comments?post=73"}],"version-history":[{"count":0,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/73\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/media?parent=73"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/categories?post=73"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/tags?post=73"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}