But SHA-256 and SHA-512 are designed on the same principles as SHA1. It seems quite plausible that the recent attack on SHA1, which is basically another example of the same technique that was also successful against MD5 and some other similar hashes, would be applicable to SHA-256 and SHA-512. It would be preferable to study the attack and find some hash function that can be proven not to be vulnerable to it.
no subject
Date: 2005-02-16 02:00 pm (UTC)