What is SHA1?

swarq

Katılımcı Üye
1 May 2020
335
185
Beacon Hills
Today, the data we transfer to the digital environment is quite high. We can give many examples of this data such as photos, videos, files. If this data has private or confidentiality, we will not leave it out. For this, we put various passwords on our computer and phone. Today, we will learn about a cryptography algorithm that is important for cryptography (encryption).

OCjNC8.md.jpg


What is SHA1?

Under the title of Secure Hashing Algorithm, it is the most secure algorithm among the secure encryption types and it is an encryption type that is widely used. SHA1 is a form of cryptography (encryption) that was created in 2005 by the National Security Agency. SHA1 was one of the reasons to be preferred, for it is more secure against MD5 encryption and difficult to crack. SHA2 and SHA3 versions have also appeared after SHA1.

I will come to the reason for this later. SHA1 has almost the same working logic as MD5, only SHA1 is more secure. Also, the ability to convert SHA1 160 bits is almost the same with external MD5.

OCjbnv.jpg


SHA1 Features

With SHA1, we can only encrypt our text, file, etc. This encrypted text, file, etc. with SHA1. unsolvable.

With SHA1, 160-bit text, file, etc. Summaries can be created. As I explained above, one of the differences with MD5 is the dimensions in the summaries.

SHA1 has a wide usage area. It can encrypt places such as computer networks, e-mail passwords, files.

OCjvsb.jpg


What are Collisions?

Conflicts are a problem for algorithms. This problem is a problem we may encounter frequently in most algorithms. If we explain the collision problem with the simplest explanation, we can say that after two different data is encrypted, the summary of the two data is the same. This conflict problem is less encounter in SHA1 than other algorithms. Let me give an example of the reason for this with a comparison. The MD5 algorithm generates a 128-bit digest. Performs 264 trying to detect and edit the conflict issue in a 128-bit summary in Md5. In SHA1, it detects the conflict by making 280 trials to 160-bit hash and prevents this problem by editing it.

OCcQ8v.md.jpg



We had an idea of what SHA1 is. I would like to say that we can say many examples such as more reliable, more difficult to break and less problems occurring in algorithms. However, as a result of the attacks made by the Cryptanalysts to SHA1 in 2005, SHA1 was shown to be unsafe and other models such as SHA2, SHA3, respectively, emerged.

Source:https://www.turkhackteam.org/kriptografi-sifreleme/1978060-sha1-nedir.html






 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.