One Article Review

Accueil - L'article:
Source NetworkWorld.webp Network World
Identifiant 322466
Date de publication 2017-02-24 11:58:00 (vue: 2017-02-24 11:58:00)
Titre I come to bury SHA1, not to praise it
Texte Most cryptography is theoretical research. When it is no longer theoretical, in practice it can become a harmful exploit.Google and Dutch research institute CWI proved that the SHA1 hash method, first introduced 20 years ago, could produce a duplicate hash from different documents using a technique that consumed significant computational resources: 6,500 years of CPU computation to complete the attack first phase and 110 years of GPU computation to complete the second phase. The exercise was computationally intensive but proved it is within the realm of possibility, especially compared to a brute force attack that would require 12 million GPU compute years.To read this article in full or to leave a comment, please click here
Envoyé Oui
Condensat 110 500 ago article attack become brute bury but can click come comment compared complete computation computational computationally compute consumed could cpu cryptography cwi different documents duplicate dutch especially exercise exploit first force from full google gpu harmful hash here institute intensive introduced leave longer method million most not phase please possibility practice praise produce proved read realm require research resources: second sha1 significant technique theoretical using when within would years
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: