ç±³å½ã¯ãç¾å¨å©ç¨ããã¦ãããã¹ã¦ã®ç±³å½æ¿åºæ¨æºã®æå·æè¡ã2010å¹´ã¾ã§ã«ããå®å ¨ãªæå·æè¡ã¸äº¤ä»£ããã¦ããæ¹éãæ確ã«æã¡åºãã¦ãããç¾å¨ãä¸çä¸ã§ä½¿ããã¦ããããã¡ã¯ãã¹ã¿ã³ãã¼ãã®æå·æè¡ã¯ããã®ã»ã¨ãã©ãã¹ã¦ãç±³å½æ¿åºæ¨æºã®æå·æè¡ã«æºãã¦ããããå½±é¿ã¯æ¥µãã¦å¤§ããã2010å¹´ã«åãã¦ç¾å¨ä½¿ããã¦ããæå·æè¡ã¯ã©ã®ããã«å¤ãã£ã¦ããã®ã ãããï¼ç·¨éé¨ï¼ 2005å¹´2æ15æ¥ãä¸ççãªæå·ã®æ¨©å¨ã§ããBruce Schneieræ°ã®BlogãSchneier on Securityãã§å ¬è¡¨ããããSHA-1 Brokenãã¨ããæ å ±ã¯ãé©ãããã£ã¦ä¸çä¸ãé§ãåã£ããç¾å¨ãããã·ã¥é¢æ°ã®ããã¡ã¯ãã¹ã¿ã³ãã¼ãã¨ãã¦æãåºãå©ç¨ããã¦ããSHA-1ã«å¯¾ãã¦ãä¸å½ã»å±±æ±å¤§å¦ã®Xiaoyun Wangæ°ã¨Hongbo Yuæ°ãã»ãã¥ãªãã£ã³ã³ãµã«ã¿ã³ãã®Yiqun Lisa Yinæ°ã®ãã¼
{{#tags}}- {{label}}
{{/tags}}