Date: Tue, 28 Sep 2004 09:27:33 -0700 From: Colin Percival <colin.percival@wadham.ox.ac.uk> To: David Schultz <das@freebsd.org> Cc: freebsd-security@freebsd.org Subject: Re: compare-by-hash (was Re: sharing /etc/passwd) Message-ID: <415990F5.4040505@wadham.ox.ac.uk> In-Reply-To: <20040928161359.GA22274@VARK.MIT.EDU> References: <Pine.LNX.4.33.0111071900280.24824-100000@moroni.pp.asu.edu> <20011107211316.A7830@nomad.lets.net> <20040925140242.GB78219@gothmog.gr> <41575DFC.9020206@wadham.ox.ac.uk> <20040927091710.GC914@orion.daedalusnetworks.priv> <41582024.2080205@wadham.ox.ac.uk> <20040928161359.GA22274@VARK.MIT.EDU>
next in thread | previous in thread | raw e-mail | index | archive | help
David Schultz wrote: > ... In fact, recent results have > raised some concerns about SHA-1 (http://eprint.iacr.org/2004/146/). I have yet to hear any justification for claims that the SHA-0 attack implies a weakness in SHA-1. The paper you cite even says "Due to the additional rotate instruction, the results of this paper are not applicable to SHA-1". Colin Percival
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?415990F5.4040505>