Difference between revisions of "SHA-1"

From The ECRYPT Hash Function Website
(General)
(Cryptanalysis)
Line 9: Line 9:
 
== Cryptanalysis ==
 
== Cryptanalysis ==
  
=== Collision Attacks ===
+
=== Best Known Results ===
  
Here I would list all papers that deal with SHA-1. We should also give the abstract and the bibtex entry for the corresponding paper. Additionall we should give our opinion about the attack described in the paper.
+
Here we summarize the best knonw (published) results.
  
 +
=== Collection of Articles ===
  
=== Second Preimage Attacks ===
+
* '''Collision Attacks'''
There exists a generic attack (works for all iterated hash functions). See ....
+
** Here I would list all papers that deal with SHA-1. We should also give the abstract and the bibtex entry for the corresponding paper. Additionall we should give our opinion about the attack described in the paper.
 +
----
  
=== Preimage Attacks ===
+
* '''Second Preimage Attacks'''
We are not aware of any article describing preimage attacks on SHA-1.
+
** There exists a generic attack (works for all iterated hash functions). See ....
 +
----
  
 +
* '''Preimage Attacks'''
 +
** We are not aware of any article describing preimage attacks on SHA-1.
 +
----
  
 
== eHash Recommendation ==
 
== eHash Recommendation ==
 
Something like: SHA-1 is considered to be broken. Please do not incorporate SHA-1 in new application any longer. Try to migrate to another hash function.
 
Something like: SHA-1 is considered to be broken. Please do not incorporate SHA-1 in new application any longer. Try to migrate to another hash function.

Revision as of 13:46, 16 October 2006

1 General

2 Cryptanalysis

2.1 Best Known Results

Here we summarize the best knonw (published) results.

2.2 Collection of Articles

  • Collision Attacks
    • Here I would list all papers that deal with SHA-1. We should also give the abstract and the bibtex entry for the corresponding paper. Additionall we should give our opinion about the attack described in the paper.

  • Second Preimage Attacks
    • There exists a generic attack (works for all iterated hash functions). See ....

  • Preimage Attacks
    • We are not aware of any article describing preimage attacks on SHA-1.

3 eHash Recommendation

Something like: SHA-1 is considered to be broken. Please do not incorporate SHA-1 in new application any longer. Try to migrate to another hash function.