<p>The Counter-Cryptanalysis project provides a drop-in replacement for the existing cryptographic hash functions MD5 and SHA-1. These algorithms have been the two largest industry standards for two decades, but their security has been broken since 2004 and 2005, respectively. The Counter-Cryptanalysis replacement functions were developed by the Cryptology group to detect forged digital signatures based on these two algorithms, that way providing protection against these attacks and allowing the safe continued use of MD5 and SHA-1.</p><p>The Counter-Cryptanalysis functions can be incorporated in software containing cryptographic components for digital signatures, particularly web browsers. The library is currently used by Microsoft, Fox-IT, Amazon, and other members of the CA/Browser Forum.</p>

MIT License

For the theoretical explanation of collision detection see the award-winning paper on Counter-Cryptanalysis:

Counter-cryptanalysis, Marc Stevens, CRYPTO 2013, Lecture Notes in Computer Science, vol. 8042, Springer, 2013, pp. 129-146, https://marc-stevens.nl/research/papers/C13-S.pdf

Cryptology

Stevens, M.M.J. (2013). Counter-Cryptanalysis.

Additional Files
view at GitHub