[or-cvs] [tor/master] Remove some stuff from the SHA-1 paragraph.
Nick Mathewson
nickm at seul.org
Fri May 8 16:52:41 UTC 2009
Author: Nick Mathewson <nickm at torproject.org>
Date: Fri, 8 May 2009 12:49:15 -0400
Subject: Remove some stuff from the SHA-1 paragraph.
Commit: 183b5905bb58c8ce21cc25d8c97193e699cb767a
We don't need to explain the difference between 2nd preimage and
collision: anybody who doesn't know can use wikipedia.
---
doc/spec/proposals/ideas/xxx-what-uses-sha1.txt | 20 ++++++++------------
1 files changed, 8 insertions(+), 12 deletions(-)
diff --git a/doc/spec/proposals/ideas/xxx-what-uses-sha1.txt b/doc/spec/proposals/ideas/xxx-what-uses-sha1.txt
index 10ada5f..b3ca3ee 100644
--- a/doc/spec/proposals/ideas/xxx-what-uses-sha1.txt
+++ b/doc/spec/proposals/ideas/xxx-what-uses-sha1.txt
@@ -75,18 +75,14 @@ Triage
SHA-1 usage that depends on collision resistance
and doesn't need the attacker to have any special keys.
- There is no need to put much effort into fixing PREIMAGE and
- SECOND PREIMAGE usages in the near-term: while SHA-1 is
- theoretically broken with regards to those attacks, no practical
- attack has been published as far as we know. The difference
- between finding any collisions and finding a second preimage is
- like the difference between finding any two people with the same
- birthday and finding someone with the same birthday as you
- personally. To fix COLLISION<code-signing> usages is not too
- important either, since anyone who has the key to sign the code
- can mount far worse attacks. It would be good to fix
- COLLISION<authority> usages, since we try to resist bad authorities
- to a limited extent. The COLLISION usages are the most important
+ There is no need to put much effort into fixing PREIMAGE and SECOND
+ PREIMAGE usages in the near-term: while there have been some
+ theoretical results doing these attacks against SHA-1, they don't
+ seem to be close to practical yet. To fix COLLISION<code-signing>
+ usages is not too important either, since anyone who has the key to
+ sign the code can mount far worse attacks. It would be good to fix
+ COLLISION<authority> usages, since we try to resist bad authorities
+ to a limited extent. The COLLISION usages are the most important
to fix.
Kelsey and Schneier published a theoretical second preimage attack
--
1.5.6.5
More information about the tor-commits
mailing list