Key Details of Weak Hashing Algorithm SHA-1

  • In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash...
  • Last updated on July 13, 2018
  • There have been 3 updates
  • Also available on
  • Virus scan status:

    Clean (it's extremely likely that this software program is clean)


Enlarged image for Weak Hashing Algorithm SH…
Weak Hashing Algorithm SHA-1 0/4

Developer's Description

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash...

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long. It was designed by the United States National Security Agency, and is a U.S. Federal Information Processing Standard.

Since 2005 SHA-1 has not been considered secure against well-funded opponents,and since 2010 many organizations have recommended its replacement by SHA-2 or SHA-3.

In 2017 CWI Amsterdam and Google announced they had performed a collision attack against SHA-1, publishing two dissimilar PDF files which produced the same SHA-1 hash.

Your task is to find user's SHA-1 hash from the application and try to solve the hash and login into the application.



Explore More


Full Specifications

GENERAL
Release
July 13, 2018
Latest update
July 13, 2018
Version
1.0.1
OPERATING SYSTEMS
Platform
Android
Additional Requirements
None
POPULARITY
Total Downloads
4
Downloads Last Week
0

Report Software

Related Software