A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Second-Preimage Analysis of Reduced SHA-1
[chapter]
2010
Lecture Notes in Computer Science
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-1 continues to be recommended in all applications except digital signatures after 2010. Recent work on preimage and second preimage attacks on reduced SHA-1 succeeding up to 48 out of 80 steps (with results barely below the 2 n time complexity of brute-force search) suggest that there is plenty of security margin left. In
doi:10.1007/978-3-642-14081-5_7
fatcat:p2qj7tb7bndqpfjydpjuc3psnu