Weaknesses in SHA-1

Thomas Sjögren thomas at northernsecurity.net
Sun Oct 3 20:32:57 CEST 2004


On Sun, Oct 03, 2004 at 08:09:33PM +0200, Per Tunedal Casual wrote:
> >r = H(H(M))
> >
> >or
> >
> >H' = H(M)
> >H' -> H1,H2
> >H" = H(H1 xor H2)
> >r = H(H")

> Would you please supply a legend? I cannot interpret your mail.

r = H(M) means result of Hash of message M
H' and H" are hash number one and two
H' -> H1,H2 means that you should split hash number one into two parts

/Thomas
-- 
== Encrypted e-mails preferred | GPG KeyID: 114AA85C
--
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 481 bytes
Desc: Digital signature
Url : /pipermail/attachments/20041003/01975d13/attachment.bin


More information about the Gnupg-users mailing list