Are there any known vulnerabilities in SHA-1 that can be exploited? Certain patterns that it shows? I recently performed a frequency analysis using 20,000 common words, and found nothing exploitable. What others techniques can I use to assert the security of SHA-1?
Asked
Active
Viewed 55 times