SHA-1

Bruce Schneier provides an overview of hashing and SHA-1 in response to the breaking of SHA-1, but where are the details on the break? He says the cryptographic significance of this technique is large since so many algorithms rely on SHA-1, so I don’t understand why the Chinese research team’s paper isn’t widely available.

This entry was posted in Uncategorized and tagged . Bookmark the permalink.