Skip to content

Implementation of the cryptographically broken SHA-0 hash function

License

Notifications You must be signed in to change notification settings

johndoe31415/sha0

Folders and files

NameName
Last commit message
Last commit date

Latest commit

247d8d1 · Dec 21, 2019

History

1 Commit
Dec 21, 2019
Dec 21, 2019
Dec 21, 2019
Dec 21, 2019
Dec 21, 2019
Dec 21, 2019
Dec 21, 2019
Dec 21, 2019

Repository files navigation

sha0

This is an implementation of the SHA-0 algorithm. Note that SHA-0 is a BROKEN algorithm; this program has been created to verify old, broken signatures.

Credits

The whole thing is based on RFC6234 (which contains a reference implementation of SHA-1). It has been put into compilable code by Tom Szilagyi (@tomszilagyi) in his GitHub project. The hint of what code changes turn SHA-1 into SHA-0 have been taken from StackExchange fgrieu, who did an excellent outline on the code differences. I'm basically just the monkey gluing pieces together :)

Usage

$ echo -n foobar >foobar
$ ./sha0 foobar
SHA0 over 6 bytes of foobar: d3fb2f31117cc1481f6c5dc1905e06892a8ca38b

License

IETF license, see LICENSE file.

About

Implementation of the cryptographically broken SHA-0 hash function

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published