April 1, 2006
      
                  
        
  Author(s)
  William E. Burr
 
       
            
    
    
        The two most commonly used cryptographic hash functions, MD5 and SHA-1, have been successfully attacked?it is no longer advisable to use them in some applications, although other applications are not affected. Furthermore, these attacks have triggered a