2011
DOI: 10.17487/rfc6194
|View full text |Cite
|
Sign up to set email alerts
|

Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms

Abstract: This document includes security considerations for the SHA-0 and SHA-1 message digest algorithm. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 0 publications
0
14
0
Order By: Relevance
“…Unfortunately, as Polk et al [PCTH11] point out, these cryptanalytic advancements are not reflected in the literature so far, as the improved attacks since the first SHA-1 collision attack are either unpublished or withdrawn.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, as Polk et al [PCTH11] point out, these cryptanalytic advancements are not reflected in the literature so far, as the improved attacks since the first SHA-1 collision attack are either unpublished or withdrawn.…”
Section: Introductionmentioning
confidence: 99%
“…All currently registered SRTP crypto suites except the GCM-based ones use HMAC-SHA1 as their HMAC algorithm to provide message authentication. Due to security concerns with SHA-1 [RFC6194], the IETF is gradually moving away from SHA-1 and towards stronger hash algorithms such as SHA-2 or SHA-3 families. For SRTP, however, SHA-1 is only used in the calculation of an HMAC, and no security issue is known for this usage at the time of this publication.…”
Section: Security Considerationsmentioning
confidence: 99%
“…As such, it presents a trade-off between performance and security. The security considerations for SHA-1 are discussed in [RFC6194].…”
Section: Strength Of the Hash Function For Merkle Hash Treesmentioning
confidence: 99%