2020 International Conference on Information Science and Communications Technologies (ICISCT) 2020
DOI: 10.1109/icisct50599.2020.9351441
|View full text |Cite
|
Sign up to set email alerts
|

Differential Collisions in SHA-1

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 6 publications
0
0
0
Order By: Relevance
“…SHA-1 is a weak hash function known to have hash collisions, making it vulnerable to differential cryptanalysis. This vulnerability makes it easier for attackers to create collision attacks, creating two different inputs that produce the same hash value, which can be used for malicious purposes [17]. In Figure 20, this code snippet uses the SHA-1 hash algorithm to generate a hash value from the given byte array.…”
Section: Sha-1mentioning
confidence: 99%
“…SHA-1 is a weak hash function known to have hash collisions, making it vulnerable to differential cryptanalysis. This vulnerability makes it easier for attackers to create collision attacks, creating two different inputs that produce the same hash value, which can be used for malicious purposes [17]. In Figure 20, this code snippet uses the SHA-1 hash algorithm to generate a hash value from the given byte array.…”
Section: Sha-1mentioning
confidence: 99%