<s>
For	O
a	O
cryptographic	B-Algorithm
hash	I-Algorithm
function	I-Algorithm
(	O
a	O
mathematical	O
algorithm	O
)	O
,	O
a	O
MASH-1	B-Algorithm
(	O
Modular	O
Arithmetic	O
Secure	O
Hash	B-Error_Name
)	O
is	O
a	O
hash	B-Error_Name
function	I-Error_Name
based	O
on	O
modular	O
arithmetic	O
.	O
</s>
<s>
Despite	O
many	O
proposals	O
,	O
few	O
hash	B-Error_Name
functions	I-Error_Name
based	O
on	O
modular	O
arithmetic	O
have	O
withstood	O
attack	O
,	O
and	O
most	O
that	O
have	O
tend	O
to	O
be	O
relatively	O
inefficient	O
.	O
</s>
<s>
MASH-1	B-Algorithm
evolved	O
from	O
a	O
long	O
line	O
of	O
related	O
proposals	O
successively	O
broken	O
and	O
repaired	O
.	O
</s>
<s>
MASH-1	B-Algorithm
involves	O
use	O
of	O
an	O
RSA-like	O
modulus	O
,	O
whose	O
bitlength	O
affects	O
the	O
security	O
.	O
</s>
<s>
Finally	O
the	O
hash	B-Error_Name
value	I-Error_Name
is	O
,	O
where	O
is	O
a	O
prime	O
number	O
with	O
.	O
</s>
<s>
There	O
is	O
a	O
newer	O
version	O
of	O
the	O
algorithm	O
called	O
MASH-2	O
with	O
a	O
different	O
exponent	O
.	O
</s>
