C0D3 CR4CK3D: Means and Methods to Compromise Common Hash Algorithms
The modern hashing algorithms are designed to help verify the integrity of a data element. Yet, as our needs to verify file contents and data transmissions evolve, we continually realize that better solutions and algorithms are needed. Better hashing algorithms are constantly in the works. However, as the past would indicate, cryptographers and hackers alike continue to find issues with each successive algorithm that is released. As one algorithm is broken, another is developed ĘC so the cycle continues. This paper will discuss the means and methods used to compromise these hashing functions and ways to protect yourself, and your data.