xsha1: cryptanalysis of Blizzard's broken SHA-1 implementation.
Caution: XSHA1 is weak, and should not be used as a hash.
XSHA1 is used in password and CD key authentication in older Blizzard games (Starcraft, Diablo 2) among other things. The fact that it's cryptographically weak has been known for years: this is a public analysis of the weakness. The goal is to determine risk posed to users, and find safeguards if possible.
The code is geared for rapid interactive development with GHCI. Excuse the lax conventions.
Data.Digest.* implements and explores XSHA1, while Data.Codec.* contains applications.
Use -f <flag> to enable a flag, or -f -<flag> to disable that flag. More info
|Dependencies||base (>=4 && <5), HUnit, QuickCheck, uniplate, vector [details]|
|Author||Alex Kropivny <firstname.lastname@example.org>|
|Maintainer||Alex Kropivny <email@example.com>|
|Uploaded||by AlexKropivny at 2012-03-15T05:10:20Z|
|Reverse Dependencies||1 direct, 0 indirect [details]|
|Downloads||1189 total (8 in the last 30 days)|
|Rating||2.0 (votes: 1) [estimated by Bayesian average]|
|Status||Docs uploaded by user
Build status unknown [no reports yet]