Cryptographic Hash Standards ? Where Do We Go From Here?
William E. Burr
The two most commonly used cryptographic hash functions, MD5 and SHA-1, have been successfully attacked?it is no longer advisable to use them in some applications, although other applications are not affected. Furthermore, these attacks have triggered a kind of feeding-frenzy in the cryptographic community; many cryptographers are now working on hash function attacks, and new results may be expected in this area for the next several years. This article discusses the SHA-1 attack and describes NIST?s plans to replace SHA-1.