2016-03-01 117 views
1

散列密碼的這些方法中哪一個最安全,最難找到散列衝突?通過SHA1散列密碼與MD5,SHA1和MD5

  1. MD5只
  2. SHA1只有
  3. MD5比SHA1
+2

所有不再被認爲是安全的,請使用SHA-2等SHA-2方法。 SHA-3的實現仍然很少見。 – zaph

+2

[如何安全地哈希密碼?](http://security.stackexchange.com/q/211/45523) –

回答

1

這些不應被用於密碼哈希,他們已經被證明是不安全的:

從維基百科MD5: The security of the MD5 has been severely compromised, with its weaknesses having been exploited in the field, most infamously by the Flame malware in 2012. The CMU Software Engineering Institute considers MD5 essentially "cryptographically broken and unsuitable for further use".

SHA1來自維基百科:

SHA-1 is no longer considered secure against well-funded opponents. In 2005, cryptanalysts found attacks on SHA-1 suggesting that the algorithm might not be secure enough for ongoing use,[3] and since 2010 many organizations have recommended its replacement by SHA-2 or SHA-3.[4][5][6] Microsoft,[7] Google[8] and Mozilla[9][10][11] have all announced that their respective browsers will stop accepting SHA-1 SSL certificates by 2017.

更安全散列算法存在諸如SHA-2或3,其應該被考慮。

+1

使用適當的醃製技術比使用正確的風味進行單向哈希安全密碼更重要。彩虹表對SHA-3的效率與MD5相當。 –

+0

完全同意:) –

+0

Aaand「資金充足的對手」的定義剛剛降低了幾個數量級,使其成爲「中等資助的對手」:https://security.googleblog.com/2017/02/announcing-第一-SHA1-collision.html – Piskvor