SHA-1 Collision Search

Introduction
How secure is secure?

The hash function "SHA-1" is one of the most widely-used cryptographic algorithms in the world. It was designed by NSA and put forward as a standard by NIST in 1995. Purchases at online stores, storing and comparing of website passwords, and securing and administering webservers are just a few examples where SHA-1 is used and trusted by many of us, directly and indirectly, on a daily basis.

The goal of "SHA-1 Collision Search Graz" is to search for weaknesses (called "collisions") in this essential algorithm. The purpose is not to cause harm, but to verify or disprove the security of this essential building block; and to develop tools which will help to more accurately estimate the security of successors to SHA-1 which are already in development.

Contents

Videos


Science

[The Science section might (or might not) be divided into two parts: {1} general discussion of the field, and then {2} a discussion of the project's specific endeavor. For instance, in LHC@home, we might have {1} "Science of the Large Hardon Collider" and then {2} "Science of LHC@home"
The above is desirable, because in most cases, the field of research is really fascinating, and presenting this in broad terms-- outlining the big questions-- can make it easier to understand the particulars of the project and why it is important. ]


Results

[Where known, we should attempt to keep track of each project's publications. A good list to draw from is here. ]


Links of Interest

[Why recreate the wheel; there are lots of great sources out there.; a good list of sources can be really useful to the reader.]


Project In the Classroom

[For each project, please add a "[Projectname] in the Classroom" section-- with a link to Volunteer Computing In the Classroom and an article named "[Projectname] in the Classroom". (Then please add "[Projectname] in the Classroom" to the list on the main Education page.)]