The SHA-1 is similar to the earlier MD5 algorithm and uses a 512-bit block size with a "264 – 1" message size.
In SHA-1, if someone changes the part of a Hash value, it will produce a different hash value.
In 2005, Bruce Schneier, a cryptographer proved that SHA-1 could be broken 2000 times faster than a brute force attack.
In 2012, on base of Moore's law and Amazon web services, Jesse Walker said, SHA-1 collision would cost:
SHA-1 standard was Deprecated for most cryptographic uses after 2010.
Because of these discoveries there has been a SHA-1 Deprecation movement.!! Why The Hash value depends on how the certificate is signed. Certificate Authority verifies the hash value at the time of Certificate issuance.
The Hash value of the browser and the Hash value of the server should be matched. When hash values match, the server and the identity of a certificate are verified.
However, SHA-1 was not able to make accurate identification of both hash value and suspicious to collision attack.
In this case, the attacker might forge a Certificate and falsely verify the server’s identity.
The HMAC construction blocks collision attacks like the new one for SHA-1. Cipher Suites using HMAC-SHA1 remain as secure now as they were before, and as secure as HMAC-SHA2 -- which is, not entirely, because there already were and still are attacks unrelated to the hash. Specifically, all HMAC Cipher Suites either use RC4, which is badly weakened and now prohibited from all versions of TLS, or CBC-mode ciphers with MAC-then-encrypt, which have been subject to a series of padding-oracle attacks -- and in TLS 1.0 also a known-IV attack (BEAST). The fix to these attacks is to use AEAD Cipher Suites (with neither HMAC-SHA1 nor HMAC-SHA2), which requires TLS 1.2.
"SHAttered" makes no difference. You should already have preferred TLS 1.2 with AEAD not HMAC-SHA1 OR HMAC-SHA2, and you should still.
TLS 1.2 uses double-HMAC-SHA2. As above HMAC protects against the collision attack, plus the key derivation and Finished data are substantially uncontrollable by an attacker anyway. No difference.
This was true for MD5 with the 'rogue' attack a decade ago, and resulted in fairly rapid retirement of MD5 certificates. The community has recognized for years that SHA-1 certificates were similarly at risk: CAs have been forbidden to issue SHA-1-signed certificates since at least 2013, depending which authority you go by, and some (most?) browsers, some other clients and servers, and many tools (notably SSLLabs widely used tester) have been warning more or less noisily and intrusively about SHA-1-signed certificates since [2014] (SHA-1 Deprecation); now, as the shattered website notes, some (many?) will soon start rejecting these certificates.
If you are still using SHA-1-signed certificates; stop. This applies to all versions of TLS and also non-SSL/TLS uses of certificates such as email encryption and code signing.