xsha1: cryptanalysis of Blizzard's broken SHA-1 implementation.
Caution: XSHA1 is weak, and should not be used as a hash.
XSHA1 is used in password and CD key authentication in older Blizzard games (Starcraft, Diablo 2) among other things. The fact that it's cryptographically weak has been known for years: this is a public analysis of the weakness. The goal is to determine risk posed to users, and find safeguards if possible.
The code is geared for rapid interactive development with GHCI. Excuse the lax conventions.
Data.Digest.* implements and explores XSHA1, while Data.Codec.* contains applications.
|Dependencies||base (==4.*), HUnit, QuickCheck, uniplate, vector [details]|
|Author||Alex Kropivny <email@example.com>|
|Maintainer||Alex Kropivny <firstname.lastname@example.org>|
|Uploaded||by AlexKropivny at Thu Mar 15 05:10:20 UTC 2012|
|Downloads||861 total (38 in the last 30 days)|
|Rating||2.0 (votes: 1) [estimated by Bayesian average]|
Docs uploaded by user
Build status unknown [no reports yet]
Use -f <flag> to enable a flag, or -f -<flag> to disable that flag. More info
For package maintainers and hackage trustees