Hacker News new | past | comments | ask | show | jobs | submit login

I'd like you to explain how you'd exploit a problem with SHA-1, or, to make it more interesting, MD5 or MD4, to attack a "typical" hashed password (say, Keychain.app "memorable") more quickly than via iterated brute force.



Currently such attacks are infeasible, but there are some very interesting, and very promising families of collision-based attacks (such as herding) which may yield results in that area, although such attacks may only work in specific cases.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: