Author(s)
William E. Burr
Abstract
The two most commonly used cryptographic hash functions, MD5 and SHA-1, have been successfully attacked?it is no longer advisable to use them in some applications, although other applications are not affected. Furthermore, these attacks have triggered a kind of feeding-frenzy in the cryptographic community; many cryptographers are now working on hash function attacks, and new results may be expected in this area for the next several years. This article discusses the SHA-1 attack and describes NIST?s plans to replace SHA-1.
Citation
IEEE Security & Privacy
Keywords
algorithms, cryptographic hash functions, cryptography, hash functions, MD5, Merkle-Damgaard, SHA-1
Citation
Burr, W.
(2006),
Cryptographic Hash Standards ? Where Do We Go From Here?, IEEE Security & Privacy (Accessed May 6, 2026)
Additional citation formats
Issues
If you have any questions about this publication or are having problems accessing it, please contact [email protected].