{"draft":"draft-hoffman-hash-attacks-04","doc_id":"RFC4270","title":"Attacks on Cryptographic Hashes in Internet Protocols","authors":["P. Hoffman","B. Schneier"],"format":["ASCII","HTML"],"page_count":"12","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"IETF - NON WORKING GROUP","abstract":"Recent announcements of better-than-expected collision attacks in\r\npopular hash algorithms have caused some people to question whether\r\ncommon Internet protocols need to be changed, and if so, how. This\r\ndocument summarizes the use of hashes in many protocols, discusses\r\nhow the collision attacks affect and do not affect the protocols,\r\nshows how to thwart known attacks on digital certificates, and\r\ndiscusses future directions for protocol designers. This memo provides information for the Internet community.","pub_date":"October 2005","keywords":["collision attacks","hash algorithms","ip","digital certificates"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4270","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc4270"}