No, I am trying to break SHA-1 encryption in the bootloader itself. I am researching the methods to do this and then consulting and math professor with a PhD for specific questions.. then I am going to try and get the private key with hash collisions. Thats my plan as of today.. this is only day one of my research though. I still think this is a viable approach.
My hope is that aliasxerog and other linux specialist will be able to take advantage of the mathamatical approach I am working out to actually be used on the android end. Theory vs. Practice is different though. I really hope it works/can work...
{{ WugFresh }}
The likelihood of finding a hash collision in SHA-1 is slim to none. I think it's more likely that you take twelve flights, they all crash and youre the lone survivor in all twelve. Not trying to be a party pooper but hash collisions are not the way to go...
Sent from my Droid using Tapatalk
It was done in 2005, documentation exists on the project, its now 2010, I have a lot of resources at my disposal and frankly I don't care if its near impossible.. the fact of the matter is that it IS possible.. I am not suggesting its probable, just that it has been done, so why can't it be done again. All the other solutions haven't come to fruition, so not giving the one a chance that might actually work would be giving up. If it were SHA2, I would say, you are 100% correct, forget it.. I wouldn't even bother. But SHA1 is actually in the realm of possibility. If its possible and hasn't been done yet.. then it's worth a shot.
If hash collisions arent the way to break SHA1 encryption then what is? Giving up? Sending moto sad faces?
{{ WugFresh }}