Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If the original input is not very short, it's extremely unlikely that an input with the same SHA-1 hash could be found. These attacks work because the passwords are weak and SHA-1 is fast to compute, not due to any weakness of SHA-1 as a cryptographic hash function.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: