Hacker News new | past | comments | ask | show | jobs | submit login

Yes, the paper linked elsewhere in this thread introduced counter-cryptanalysis, for both MD5 and SHA1:

https://marc-stevens.nl/research/papers/C13-S.pdf

"Counter-cryptanalysis in principle enables the continued secure use of weak cryptographic primitives."




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: