<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SHA-1 Practical Attack in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/SHA-1-Practical-Attack/m-p/31451#M2095</link>
    <description>&lt;P&gt;SHA-1, are you kidding me? Nobody uses that! Guess again my friend. Although it&lt;SPAN&gt;&amp;nbsp;has been slowly phased out over the past five years, it remains far from being fully deprecated. It's still the &lt;STRONG&gt;default hash function for certifying PGP keys in the legacy 1.4 version branch of GnuPG&lt;/STRONG&gt;, the open-source successor to PGP application for encrypting email and files. Those SHA1-generated signatures were accepted by the modern &lt;STRONG&gt;GnuPG&lt;/STRONG&gt; branch until recently, and were only rejected after the researchers behind the &lt;STRONG&gt;new "chosen-prefix" collision&lt;/STRONG&gt;&amp;nbsp;attack privately reported their results. Here is a link to the academic&amp;nbsp;paper "&lt;A href="https://eprint.iacr.org/2020/014.pdf" target="_blank" rel="noopener"&gt;SHA-1 is a Shambles&lt;/A&gt;".&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:24:05 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2023-10-09T09:24:05Z</dc:date>
    <item>
      <title>SHA-1 Practical Attack</title>
      <link>https://community.isc2.org/t5/Tech-Talk/SHA-1-Practical-Attack/m-p/31451#M2095</link>
      <description>&lt;P&gt;SHA-1, are you kidding me? Nobody uses that! Guess again my friend. Although it&lt;SPAN&gt;&amp;nbsp;has been slowly phased out over the past five years, it remains far from being fully deprecated. It's still the &lt;STRONG&gt;default hash function for certifying PGP keys in the legacy 1.4 version branch of GnuPG&lt;/STRONG&gt;, the open-source successor to PGP application for encrypting email and files. Those SHA1-generated signatures were accepted by the modern &lt;STRONG&gt;GnuPG&lt;/STRONG&gt; branch until recently, and were only rejected after the researchers behind the &lt;STRONG&gt;new "chosen-prefix" collision&lt;/STRONG&gt;&amp;nbsp;attack privately reported their results. Here is a link to the academic&amp;nbsp;paper "&lt;A href="https://eprint.iacr.org/2020/014.pdf" target="_blank" rel="noopener"&gt;SHA-1 is a Shambles&lt;/A&gt;".&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:24:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/SHA-1-Practical-Attack/m-p/31451#M2095</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:24:05Z</dc:date>
    </item>
  </channel>
</rss>

