Skip to content
Admin's Choice

The Tech Magazine

Collision

Posted inSecurity

SHA-1 Collision – Insecurity of SHA-1 exposed by Google

SHA-1 is widely used in applications like SSL, SSH, TLS, IPsec PGP, S/MIME to protect the sensitive information.

Google has demonstrated that SHA-1 Collision is possible and two files can have the same SHA-1 hash. This means that system can be manipulated by presenting it with manipulated data with same hash as good data.

Continue Reading
Read More
Tags: Collision, google, SHA-1

Categories

  • Backup
  • Basics
  • Boot
  • Cloud
  • devOps
  • DNS
  • Errors
  • Exam
  • Featured
  • File system
  • Guest Posting
  • Hadoop
  • Install
  • IOS
  • Linux
  • Monitoring
  • Network
  • News
  • NIS
  • OS X
  • Performance
  • Programming
  • python for beginners
  • Security
  • Sponsored
  • Technology
  • Testing
  • Tips
  • Top 10
  • Top List
  • Trends
  • Volumes
  • Windows

Recent Posts

  • Crontab Generator – easily create cron jobs in seconds
  • How does SSL work? All about SSL certificates and TLS certificates
  • What is Load Balancer and How it works ?
  • python sort() or sorted()- which one to chose for your program ?
  • terraform vs kubernetes – Key Differences that set them apart
Copyright 2025 — Admin's Choice. All rights reserved.

About | Terms & Conditions|Privacy | |Disclaimer | Copyright | Contact | RSS Feed

Scroll to Top