Maybe this is interesting for someone.
It's a distributed attack on SHA-1. They try to find collision with a interesting approach.
http://boinc.iaik.tugraz.at/sha1_coll_search/
OHPen
Maybe this is interesting for someone.
It's a distributed attack on SHA-1. They try to find collision with a interesting approach.
http://boinc.iaik.tugraz.at/sha1_coll_search/
OHPen
- Reverse Enginnering can be everything, but sometimes it's more than nothing. Really rare moments but then they appear to last ages... -
This is the same technique used for MD5 (sequential multi-message modification via tunneling), though in the case of MD5 it takes only a few seconds, while for SHA-1 the search space is much larger.
What.The applications run by SHA-1 Collision Search Graz may cause some computers to overheat.
To overheat, not burn to ashes :P
A picture worth 1K words (or .5K DWORDS).
@LLXX: I think the remark refers to a 100 % cpu efficiency. I think we shouldn't take it literally.
OHPen
- Reverse Enginnering can be everything, but sometimes it's more than nothing. Really rare moments but then they appear to last ages... -
Getting even closer...
Differential Path for SHA-1 with complexity O(2^52):
http://eprint.iacr.org/2009/259.pdf
"Give a man a quote from the FAQ, and he'll ignore it. Print the FAQ, shove it up his ass, kick him in the balls, DDoS his ass and kick/ban him, and the point usually gets through eventually."
Bookmarks