NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Cryptographic Hash Standards ? Where Do We Go From Here?
Published
Author(s)
William E. Burr
Abstract
The two most commonly used cryptographic hash functions, MD5 and SHA-1, have been successfully attacked?it is no longer advisable to use them in some applications, although other applications are not affected. Furthermore, these attacks have triggered a kind of feeding-frenzy in the cryptographic community; many cryptographers are now working on hash function attacks, and new results may be expected in this area for the next several years. This article discusses the SHA-1 attack and describes NIST?s plans to replace SHA-1.