Results 1 to 5 of 5

Thread: SHA-1 Collision Search - New approach

  1. #1
    ::[ Reverse Engineer ]:: OHPen's Avatar
    Join Date
    Nov 2002
    Location
    .text
    Posts
    399
    Blog Entries
    5

    SHA-1 Collision Search - New approach

    Maybe this is interesting for someone.

    It's a distributed attack on SHA-1. They try to find collision with a interesting approach.

    http://boinc.iaik.tugraz.at/sha1_coll_search/

    OHPen
    - Reverse Enginnering can be everything, but sometimes it's more than nothing. Really rare moments but then they appear to last ages... -

  2. #2
    This is the same technique used for MD5 (sequential multi-message modification via tunneling), though in the case of MD5 it takes only a few seconds, while for SHA-1 the search space is much larger.
    The applications run by SHA-1 Collision Search Graz may cause some computers to overheat.
    What.

  3. #3
    Registered User
    Join Date
    Aug 2005
    Location
    Greece
    Posts
    157
    To overheat, not burn to ashes :P
    A picture worth 1K words (or .5K DWORDS).

  4. #4
    ::[ Reverse Engineer ]:: OHPen's Avatar
    Join Date
    Nov 2002
    Location
    .text
    Posts
    399
    Blog Entries
    5
    @LLXX: I think the remark refers to a 100 % cpu efficiency. I think we shouldn't take it literally.

    OHPen
    - Reverse Enginnering can be everything, but sometimes it's more than nothing. Really rare moments but then they appear to last ages... -

  5. #5
    Administrator dELTA's Avatar
    Join Date
    Oct 2000
    Location
    Ring -1
    Posts
    4,204
    Blog Entries
    5
    Getting even closer...

    Differential Path for SHA-1 with complexity O(2^52):
    http://eprint.iacr.org/2009/259.pdf
    "Give a man a quote from the FAQ, and he'll ignore it. Print the FAQ, shove it up his ass, kick him in the balls, DDoS his ass and kick/ban him, and the point usually gets through eventually."

Similar Threads

  1. maybe a different approach to SecuROM et. al.
    By Darkelf in forum Advanced Reversing and Programming
    Replies: 5
    Last Post: April 28th, 2010, 07:14
  2. Nice MD5 Collision!
    By bilbo in forum RCE Cryptographics
    Replies: 2
    Last Post: June 27th, 2005, 07:11
  3. Collision vulnerabilities in MD5 Checksums
    By hosiminh in forum RCE Cryptographics
    Replies: 7
    Last Post: December 14th, 2004, 17:38
  4. ASPR 1.23 loader SEH approach
    By Mrklippel in forum Malware Analysis and Unpacking Forum
    Replies: 5
    Last Post: April 20th, 2004, 09:34
  5. Crackme using a different approach
    By The Diver in forum Mini Project Area
    Replies: 0
    Last Post: April 22nd, 2001, 06:54

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •