Questions tagged [sha1]

SHA-1 is a cryptographic hash function designed by the U.S. Government as a Federal Information Processing Standard. Recently, collisions have been detected, meaning that SHA1 is becoming more vulnerable to attacks, and its use for protecting data is not recommended.

NOTE: Sha1 is no longer secure due to collisions being found. It is recommended you use or another hashing system like

In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The three SHA algorithms are structured differently and are distinguished as SHA-0, SHA-1, and SHA-2. SHA-1 is very similar to SHA-0, but corrects an error in the original SHA hash specification that led to significant weaknesses. The SHA-0 algorithm was not adopted by many applications. SHA-2 on the other hand significantly differs from the SHA-1 hash function.

SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely-used security applications and protocols. In 2005, security flaws were identified in SHA-1, namely that a mathematical weakness might exist, indicating that a stronger hash function would be desirable. Although no successful attacks have yet been reported on the SHA-2 variants, they are algorithmically similar to SHA-1 and so efforts are underway to develop improved alternatives. A new hash standard, SHA-3, is currently under development — an ongoing NIST hash function competition is scheduled to end with the selection of a winning function in 2012.

References:

1825 questions
0
votes
0 answers

Can't get location when build apk relase

I am writing an first android application. My app include firebase api, google map api, google geolocation api. they have same api key. When i write app i test it on a smarphone(sony experia Z1 android sdk 19) and it run well. After that i build it…
0
votes
0 answers

Two different servers generates half different hash with sha1

I'm trying to implement a php authentication algorithm for WeChat, code was copied from their documentation here: https://mp.weixin.qq.com/wiki?t=resource/res_main&id=mp1421135319&token=&lang=zh_CN Basically, a service that sends few parameters and…
TwoDiv
  • 325
  • 4
  • 13
0
votes
1 answer

integrating java code with a browser

This question is a general one. I have java code for hmac(sha1 and md5) coding and a client server key exchange protocol(both codes in java). Now i want to embed/integrate this with a browser to implement password hashing. Any ideas how i might…
ayush
  • 14,350
  • 11
  • 53
  • 100
0
votes
2 answers

Generate md5 or sha1 hash across windows & linux system in php

I m trying to generate a signature using md5 or sha1 hash on a linux system. This signature will be tested across a windows system to ensure it authenticates. What i find is both hash generated using same parameters are different. Please help how i…
Maanas Royy
  • 1,522
  • 1
  • 17
  • 30
0
votes
0 answers

How to get the info_hash value of a .torrent file

I try to extract the info_hash data from a .torrent file but I can not. I currently do my test with this torrent file but i found no way to get it. The doc says The 20 byte sha1 hash of the bencoded form of the info value from the metainfo file.…
Victor Castro
  • 1,232
  • 21
  • 40
0
votes
2 answers

Is there a maximu 'safe' amount of data to hash?

I would like to send some data to a device and I need to verify consistency. There will be no attacker, there can be just hardware faults. Maximmum data size in my case will be about 256kB. I'm interested in small footprint algorithms and also small…
j123b567
  • 3,110
  • 1
  • 23
  • 32
0
votes
1 answer

Format sha-1 hash like .net does

I have a question about how java prints the HexString and how to print it in the same format that C# using the BitConverter does. We (both) are generating this Hex as result of hashing a string with SHA-1 : a94a8fe5ccb19ba61c4c873d391e987982fbbd3…
Rafihna
  • 15
  • 7
0
votes
1 answer

Help with SHA1 or MD5 in PHP

I have created a form that inserts the entered data into the database. It works perfectly except when I put SHA1('$password') into the INSERT INTO VALUSE tag. If I put only '$password it works fine. Putting SHA1 displays - You have an error in your…
Johnson
  • 17
  • 1
  • 1
  • 8
0
votes
1 answer

Migrate SHA1 Salted Hashes To Be Encrypted by Bcrypt

I have an old application (built on .Net C#) includes Users table with hashed passwords sha1(password . salt), and I need to migrate this data safely to my new Rails application (which already encrypting passwords using bcrypt-ruby gem) and looking…
Moamen Naanou
  • 1,683
  • 1
  • 21
  • 45
0
votes
0 answers

SHA-1 HMAC example

I am in a security class at college and we are going over hashing algorithms right now. I have been looking all over to find a good explanation of how HMAC gets from a key and message to a hash, but I can't find one. The wiki page and every other…
Steve Pulse
  • 59
  • 1
  • 8
0
votes
2 answers

Binary values don't add up correctly

I'm trying to write an implementation of SHA-1 in C++. But for some reason I can't get it to work. Two values won't add up correctly. I'm using this link to check the steps of SHA-1 with input test In the first round of the function (for word 0) I…
Cartman123
  • 147
  • 6
0
votes
1 answer

How can I get an Android keystore file's "SHA1 fingerprint"?

Okay, I need some serious help. So I want to use some Google Play Services in my game that's not yet released. I made my game using the Unreal Engine. I followed this documentation to generate the keystore file, but I need the SHA1 fingerprint and I…
0
votes
4 answers

Sha-1 hash fixed point

how hard is it to find x where sha1(x) = x? where x is the form of 'c999303647068a6abaca25717850c26c9cd0d89c' i think the fact that there are sha1 collisions make this possible, but, how easy (or hard) is it to find an example?
0
votes
0 answers

how to find keystore file where is my sha1 key is saved

I have changed my sha1 key but google will now allow me to upload apk with the new sha1 key so I have a backup where is my old sha1 key so If i get the extension i can replace my sha1 key to old one ... how to know in which extension sha1 key is…
0
votes
0 answers

changing a function to use SHA256 hashing rather than SHA1 hashing

Can someone kindly help me with the following question I have the following function which works fine function Decrypt-String($Encrypted, $Passphrase, $salt, $init) { if($Encrypted -is [string]){ $Encrypted =…
user2971567
  • 51
  • 1
  • 1
  • 4