SHA: Difference between revisions
From Hackepedia
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
SHA-0 (Secure Hash Algorithm) was a proposal by the U.S. government that was replaced by SHA-1 in FIPS 180-1. SHA-1 addresses the weakness found in SHA-0 by adding an additional circular shift operation. SHA-1 has [http://theory.csail.mit.edu/~yiqun/shanote.pdf a reported weakness] as far as [[hash collision]]s are concerned and awareness should be raised if you are implementing it. | SHA-0 (Secure Hash Algorithm) was a proposal by the U.S. government that was replaced by SHA-1 in FIPS 180-1. SHA-1 addresses the weakness found in SHA-0 by adding an additional circular shift operation. SHA-1 has [http://theory.csail.mit.edu/~yiqun/shanote.pdf a reported weakness] as far as [[hash collision]]s are concerned and awareness should be raised if you are implementing it. | ||
If you have the sha1 application installed, you can make use of the command like so: | |||
$ sha1 /etc/passwd | $ sha1 /etc/passwd | ||
SHA1 (/etc/passwd) = c7ae5b7306797d9f1f5fba85683cdd36ba8d1a08 | SHA1 (/etc/passwd) = c7ae5b7306797d9f1f5fba85683cdd36ba8d1a08 |
Revision as of 07:51, 27 October 2005
SHA-0 (Secure Hash Algorithm) was a proposal by the U.S. government that was replaced by SHA-1 in FIPS 180-1. SHA-1 addresses the weakness found in SHA-0 by adding an additional circular shift operation. SHA-1 has a reported weakness as far as hash collisions are concerned and awareness should be raised if you are implementing it.
If you have the sha1 application installed, you can make use of the command like so:
$ sha1 /etc/passwd SHA1 (/etc/passwd) = c7ae5b7306797d9f1f5fba85683cdd36ba8d1a08