Analyze SHA-1 in message schedule

Abstract Wang et al have found a family of collisions in MD5. They reported their method to find a collision efficiently in SHA, and also to find a collision in SHA-1 within 269 hash steps in February 2005. In fact, we can still discover the decay phenomenon with the application of a message schedule’s judgment proposed in this work when inspection how SHA-1 generates message schedule actually. Therefore, we would like to introduce two SHA-1 corrections to enhance the security of SHA-1.