We broke 92% of SHA-256 – you should start to migrate from it
stateofutopia.com - 46 poäng - 8 kommentarer - 9668 sekunder sedan
Kommentarer (6)
- pavel_lishin - 5437 sekunder sedan> Secure hash functions are used to make a short version of a large file. Ideally, it has several properties including making it infeasible to find two files with the same cryptographic hash. We've just gotten 92% of the way there. This has security ramifications in that other researchers are expected to be able to complete the work through similar methods as explored in the paper. We weren't sure if this was a remarkable result, since it's not a full collision
I thought this meant they were able to generate collisions for 92% of files/hashes they tried, but it sounds like they're able to generate hashes that are 92% identical?
- kstrauser - 5367 sekunder sedanFor a shorter executive summary, what does "broke" mean here? Can you reliably produce collisions now for 92% of SHA-256 digests?
- jimjeffers - 5531 sekunder sedanIs this real? The website does not look credible.
- pixelpoet - 5460 sekunder sedanAre you sure you asked enough times for money on the website? I only counted 5 instances, not counting the AI-produced PDF doc.
- logicallee - 9668 sekunder sedanIn the linked work, we've broken 92% of SHA-256 across its full 64 rounds, and were encouraged to publish it by the leading cryptographer in the field (who held the previous record). Currently, SHA-256 is the basis of TLS certificates, bitcoin, and many other security applications. We think it is time to begin to migrate to other hash families, because we expect the rest of SHA-256 to fall soon.
- - 7681 sekunder sedan
Nördnytt! 🤓