TL;DR: If the four 32-bit constants of SHA-1 can be modified, then exploitable collisions can be constructed. No need to panic, this doesn’t affect the original SHA-1. However, vendors and customers of products with custom cryptography will be interested. Summary This is the webpage of the Malicious SHA-1 project, a research project that demonstrates how the security of the SHA-1 hashing standard
![Malicious SHA-1](https://cdn-ak-scissors.b.st-hatena.com/image/square/dfb7ec1d3e6481fa8ae345c23ad897fe0554bedf/height=288;version=1;width=512/https%3A%2F%2Fmalicioussha1.github.io%2Fimg%2Fdiff.png)