This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result.... The attack pretty much put a bullet into SHA -1 as a hash function for digital signatures, even though it is beyond the scope of most criminals to exploit.
Downloads and Drivers
From the Forums
Subscribe to TechSpot
Get free exclusive content, learn about new features and breaking tech news.