TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Lifetimes of cryptographic hash functions

153 pointsby tswicegoodalmost 12 years ago

15 comments

ReidZBalmost 12 years ago
I think SHA-2 should be &quot;minor weakness discovered&quot; (if not outright &quot;unbroken&quot;), not &quot;weakened&quot;.<p>At the onset of the SHA-3 competition, everyone was nervous about SHA-2: it appeared as though a good attack was inevitable, what with the cryptanalytic attacks on SHA-1.<p>But as the competition went on, things got calmer. The attacks against SHA-2 that were so expected simply weren&#x27;t coming[1]. And so now the status quo is that SHA-2 seems pretty darn safe, and the real focus of the SHA-3 competition shifted towards not necessarily having a direct replacement for SHA-2, in the sense of performance, but instead having a design that was sufficiently different to not allow SHA-2 attacks to apply to it. And Keccak is just that: quite different.<p>Anyway, my point is that SHA-2 is mislabeled. Honestly, I think cryptographers recommend it the most out of any of the hash functions currently; SHA-3&#x27;s software performance is rather... lacking.<p>[1] Some may argue that this is because cryptographers were focused on the SHA-3 candidates, but I&#x27;m not so sure
评论 #6124159 未加载
pbsdalmost 12 years ago
Why is SHA-2 orange? As far as I know, besides length-extension, there&#x27;s no known weakness on the full hash function.
评论 #6125698 未加载
josephagossalmost 12 years ago
If the SHA-2 family have weaknesses, and SHA-2 is used for generating Bitcoin blocks, whoever breaks this first will be an overnight millionaire, just make sure you break them slowly (about 20 a day max) to avoid suspicion that the hashing is compromised. Sell as much as possible and then release your paper.
评论 #6125614 未加载
ceauteryalmost 12 years ago
The &quot;slashdotter reaction&quot; column is priceless!
Scaevolusalmost 12 years ago
Use of SHA-1 for digital signature generation has been deprecated by NIST since 2011. It&#x27;s disallowed after 2013-- which is important for software aiming for government use.<p><a href="http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf" rel="nofollow">http:&#x2F;&#x2F;csrc.nist.gov&#x2F;publications&#x2F;nistpubs&#x2F;800-131A&#x2F;sp800-13...</a>
mistercowalmost 12 years ago
&gt;[1] Note that 128-bit hashes are at best 2^64 complexity to break; using a 128-bit hash is irresponsible based on sheer digest length.<p>Can a short hash which has not been weakened be lengthened by taking two hashes and concatenating?<p><pre><code> fixedSalt = &quot;blah&quot; longerHash = (salt, input) -&gt; hash(salt + input) + hash(salt + fixedSalt + input) </code></pre> Edit: Never mind. Obviously an attacker would only have to break the first half of the resulting hash.<p>But is there any valid way to lengthen a too-short hash? Not that it&#x27;s of practical importance; I&#x27;m just curious academically.
评论 #6125107 未加载
评论 #6125861 未加载
jgalealmost 12 years ago
I guess 2004 was a crazy year for cryptography.
评论 #6124364 未加载
评论 #6124333 未加载
liamzebedeealmost 12 years ago
Sorry, why is RIPEMD-160 deprecated? I&#x27;ve been unable to find any supporting information as to why.
评论 #6124456 未加载
tudorconstantinalmost 12 years ago
Confession time: i still have some apps with salted md5 hashed passwords
评论 #6124298 未加载
评论 #6124138 未加载
评论 #6124789 未加载
评论 #6125620 未加载
dkokelleyalmost 12 years ago
For more information on the &#x27;weakened&#x27; state of SHA-2, see <a href="http://eprint.iacr.org/2004/207" rel="nofollow">http:&#x2F;&#x2F;eprint.iacr.org&#x2F;2004&#x2F;207</a><p>(Full text PDF: <a href="http://eprint.iacr.org/2004/207.pdf" rel="nofollow">http:&#x2F;&#x2F;eprint.iacr.org&#x2F;2004&#x2F;207.pdf</a>)
lmmalmost 12 years ago
It&#x27;d be nice to have whirlpool in the list - I remember when it was seen as the great new hope for a good hash, but I haven&#x27;t heard anything about it in recent years.
wldlyinaccuratealmost 12 years ago
The Expert&#x2F;Programmer&#x2F;Non-expert reactions at the bottom are priceless.
Ricaparalmost 12 years ago
The &quot;reactions&quot; table at the bottom made my morning.
islonalmost 12 years ago
2004 was a bad year for cryptographic hash functions...
rorrr2almost 12 years ago
It&#x27;s missing the most important ones: Scrypt, PBKDF2, Bcrypt.<p><a href="https://en.wikipedia.org/wiki/Scrypt" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Scrypt</a><p><a href="https://en.wikipedia.org/wiki/Bcrypt" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Bcrypt</a><p><a href="https://en.wikipedia.org/wiki/PBKDF2" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;PBKDF2</a><p>Scrypt being an absolute nightmare to bruteforce, even for short passwords.<p><a href="http://i.stack.imgur.com/sOMvu.png" rel="nofollow">http:&#x2F;&#x2F;i.stack.imgur.com&#x2F;sOMvu.png</a>
评论 #6124900 未加载
评论 #6124856 未加载