Concerns about Hash Cracking Aftereffect on Authentication Procedures in Applications of Cyberspace

Abstract

In the Crypto 2004 Conference (Wang et al., 2004), one of the big news was that a fundamental technique in cryptography - one of the hash algorithms, Message Digest 5 (MD5) had been cracked. Soon after this event, it was announced that the secure hash algorithm (SHA-1) had been cracked as well. This series of information shocked the researches in the field… (More)

2 Figures and Tables

Topics

  • Presentations referencing similar topics