Exploiting SHA1's "XOR weakness" allows for faster hash calculation

2012-12-05 Thread Sebastian Schuberth
Hi, to say it in advance: I do not want to trigger any bogus security discussion here. Instead, I believe the findings from [1] allow for an up to 20% faster SHA1 calculation, if my brief reading of the presentation is correct. Any opinions on integration this optimization into Git? [1] htt

Re: Exploiting SHA1's "XOR weakness" allows for faster hash calculation

2012-12-05 Thread Marko Kreen
On Wed, Dec 5, 2012 at 11:19 AM, Sebastian Schuberth wrote: > to say it in advance: I do not want to trigger any bogus security discussion > here. Instead, I believe the findings from [1] allow for an up to 20% faster > SHA1 calculation, if my brief reading of the presentation is correct. Any > op

Re: Exploiting SHA1's "XOR weakness" allows for faster hash calculation

2012-12-05 Thread Theodore Ts'o
On Wed, Dec 05, 2012 at 10:19:43AM +0100, Sebastian Schuberth wrote: > > to say it in advance: I do not want to trigger any bogus security > discussion here. Instead, I believe the findings from [1] allow for > an up to 20% faster SHA1 calculation, if my brief reading of the > presentation is corr

Re: Exploiting SHA1's "XOR weakness" allows for faster hash calculation

2012-12-06 Thread Sebastian Schuberth
On Wed, Dec 5, 2012 at 6:20 PM, Theodore Ts'o wrote: > It's only useful if you are trying to do brute-force password > cracking, where the password is being hashed in a very specific way. > (If for example the password was replicated N times in the input > buffer for SHA-1, instead of keeping the