Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 28 Sep 2004 09:27:33 -0700
From:      Colin Percival <colin.percival@wadham.ox.ac.uk>
To:        David Schultz <das@freebsd.org>
Cc:        freebsd-security@freebsd.org
Subject:   Re: compare-by-hash (was Re: sharing /etc/passwd)
Message-ID:  <415990F5.4040505@wadham.ox.ac.uk>
In-Reply-To: <20040928161359.GA22274@VARK.MIT.EDU>
References:  <Pine.LNX.4.33.0111071900280.24824-100000@moroni.pp.asu.edu> <20011107211316.A7830@nomad.lets.net> <20040925140242.GB78219@gothmog.gr> <41575DFC.9020206@wadham.ox.ac.uk> <20040927091710.GC914@orion.daedalusnetworks.priv> <41582024.2080205@wadham.ox.ac.uk> <20040928161359.GA22274@VARK.MIT.EDU>

next in thread | previous in thread | raw e-mail | index | archive | help
David Schultz wrote:
> ...  In fact, recent results have
> raised some concerns about SHA-1 (http://eprint.iacr.org/2004/146/).

I have yet to hear any justification for claims that the SHA-0 attack
implies a weakness in SHA-1.  The paper you cite even says "Due to the
additional rotate instruction, the results of this paper are not
applicable to SHA-1".

Colin Percival



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?415990F5.4040505>