“Researchers from Google, CTI Break SHA-1 Hash Encryption Function”

Security researchers at Google and the CWI Institute have revealed that the Secure Hash Algorithm-1 (SHA-1) cryptographic function is still susceptible to being cracked by hackers. Researchers were able to mathematically generate identical SHA-1 hashes for different sets of data, which defeats the purpose of implementing a cryptographic hash function. This article discusses the purpose of cryptographic hash functions as well as how industries are expected to implement higher forms of encrypted hash functions.

http://www.eweek.com/security/researchers-from-google-cti-break-sha-1-hash-encryption-function.html

Submitted by Anonymous on