Chinese experts crack SHA-1, information security calls new algorithm

xiaoxiao2021-03-06  45

Source: Three Chinese scholars have recently impacted the SHA-1 hashing (HASH) algorithm in today's many mainstream safety products. These top decipherives said that users can still trust the SHA-1-based systems and applications today, but the next generation of products will need to turn to the new algorithm. SHA-1 Applications Wide SHA-1 hash is widely used in digital certificates, a major key technology foundation for security Sockets layers (SSL). SSL is generally used to send security information over the Internet, such as credit card numbers. In addition, some chip manufacturers, including Atmel, Infineon, National Semiconductor, and STMicroelectronics, using SHA-1 as the basis for the so-called trusted platform module (TPMS), Provide trusted hardware foundations for PCs and other devices. Chinese experts crack SHA-1 algorithm at the RSA seminar held recently, the famous deciphering expert and professor of the WeizMann Academy of Sciences, ADI Shamir, said he received an email from Wang Xiaoyun, Hongbo, etc. from China Shandong University. The draft technical papers are included. This paper describes how to handle two independent files to generate the same SHA-1 hash, and computational complexity is lower than previous methods. China

转载请注明原文地址:https://www.9cbs.com/read-54404.html

New Post(0)