View Single Post
  #9  
Old 02-17-2005, 05:03
SheepShagger's Avatar
SheepShagger SheepShagger is offline
Friend
 
Join Date: Jan 2002
Location: UK
Posts: 58
Rept. Given: 2
Rept. Rcvd 6 Times in 1 Post
Thanks Given: 0
Thanks Rcvd at 0 Times in 0 Posts
SheepShagger Reputation: 6
Not quite. A (cryptographic) hash is not the encrypted message but rather the message's 'fingerprint'. For example:

The SHA-1 hash of "SheepShagger" is 0x03009B1F75C4D6FA9DA6C9A83C615D09DE99CEA2. If the message is altered in any way the hash will be completely different, so "Sheep-Shagger" will produce 0xCA76C00D3355B8B56AED7EF575FC827E20814EDB.

Because hashing algorithms are the building blocks of cryptographic systems, finding any weakness is significant as it undermines the systems that rely on them, but it doesn't necessarily make them unsafe. In this case it probably means that new crypto systems will not use SHA-1 anymore.

A great (and free!) book about all things crypto is Handbook of Applied Cryptography available at h++p://www.cacr.math.uwaterloo.ca/hac/

Last edited by SheepShagger; 02-17-2005 at 05:07.
Reply With Quote