- About CSAIL
- News + Events
- Alumni & Friends
Chinese researchers compromise SHA-1 hashing algorithm
A team of three Chinese researchers have compromised the SHA-1 hashing algorithm at the core of many of today's mainstream security products. Top cryptographers said users can still rely on today's SHA-1-based systems and applications, but next-generation products will need to move to new algorithms.