Researches from Google and CWI Amsterdam are announcing the first practical technique for generating a SHA-1 collision. Here is the summary of how they went about generating a collision. As a proof of the attack, they are releasing two PDFs that have identical SHA-1 hashes but different content.

Load More Related Articles
Load More In News

Leave a Reply

Your email address will not be published. Required fields are marked *