SHA-1 crypto algorithm is dead by collision attack – CyberScoop

TheSHA-1 cryptographic hash functionis dead.

A24-year-old security mechanism still in wide use around the internet today, the NSA-developed cryptographic algorithm was finally proven to be broken this week by a team of Dutch cryptographers and Google researchers who published their work atshattered.io. The researchers showed how to collide two different files but come out with the same digital signature, showing once and for all that the SHA-1 algorithm suffers from fatal weaknesses and can no longer effectively be trusted as a cryptographic signature guaranteeing the veracity of files.

You can read the full research paper here. The attack, which took the equivalent of 110 years of single-GPU computations and 6,500 years of single-CPU computations, has never been spotted in the wild.

Although SHA-1 was officially deprecated by NIST in 2011, its still used widely in digital certificates, software management and encryption programs. Cryptographic algorithms are used as crucial bulwarks of security. When the MD5 algorithm was broken in 2010, nation-state attackers forged Microsofts signature and could then hijack Windows update impacting millions of users, making the infiltration of targeted networks a far more obtainable task.

In 2012, when the death of SHA-1 was still just a hypothetical, researchers warned of the consequences.

When it does happen, its going to be a disaster, because SHA1 is everywhere, Matthew Green, a cryptography professor at Johns Hopkins University, toldArs Technica. You could be Microsoft, you could be Google, if you were able to get an attack on SHA-1.

The cryptographer Bruce Schenier recommendedthat same year to begin migration away from SHA-1 as quickly as possible.

As of Friday, both Chrome and Firefox will automatically protectusers from insecure TLS/SSL certificates. Files sent in Gmail and Google Drive are already subject to testing against the attack.

The researchers point to safer alternatives, such as SHA-256 or SHA-3. Other experts suggest looking at speedier functions like Blake2. Whatever the choice, the lesson is clear: Change or be a soft target.

See the rest here:
SHA-1 crypto algorithm is dead by collision attack - CyberScoop

Related Posts
This entry was posted in $1$s. Bookmark the permalink.