The SHA1 hash function is now completely unsafe (2024)

The SHA1 hash function is now completely unsafe (1)

byLucian Constantin

CSO Senior Writer

news

23 Feb 20174 mins

Data and Information SecurityEncryptionSecurity

Researchers have achieved the first practical SHA-1 collision, generating two PDF files with the same signature

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature. This shows that the algorithm’s use for security-sensitive functions should be discontinued as soon as possible.

SHA-1 (Secure Hash Algorithm 1) dates back to 1995 and has been known to be vulnerable to theoretical attacks since 2005. The U.S. National Institute of Standards and Technology has banned the use of SHA-1 by U.S. federal agencies since 2010, and digital certificate authorities have not been allowed to issue SHA-1-signed certificates since Jan. 1, 2016, although some exemptions have been made.

However, despite these efforts to phase out the use of SHA-1 in some areas, the algorithm is still fairly widely used to validate credit card transactions, electronic documents, email PGP/GPG signatures, open-source software repositories, backups and software updates.

A hash function such as SHA-1 is used to calculate an alphanumeric string that serves as the cryptographic representation of a file or a piece of data. This is called a digest and can serve as a digital signature. It is supposed to be unique and non-reversible.

If a weakness is found in a hash function that allows for two files to have the same digest, the function is considered cryptographically broken, because digital fingerprints generated with it can be forged and cannot be trusted. Attackers could, for example, create a rogue software update that would be accepted and executed by an update mechanism that validates updates by checking digital signatures.

In 2012, cryptographers estimated that a practical attack against SHA-1 would cost $700,000 using commercial cloud computing services by 2015 and $173,000 by 2018. However, in 2015, a group of researchers from Centrum Wiskunde and Informatica (CWI) in the Netherlands, Nanyang Technological University (NTU) in Singapore and Inria in France devised a new way to break SHA-1 that they believed would significantly lower the cost of attacks.

Since then, the CWI researchers have worked with Google, using the company’s massive computing infrastructure, to put their attack into practice and achieve a practical collision. It took nine quintillion SHA-1 computations, but they succeeded.

According to Google, it was one of the largest computations ever completed: the equivalent processing power of 6,500 years of single-CPU computations and 110 years of single-GPU computations. It was performed on the same infrastructure that powers Alphabet’s AlphaGo artificial intelligence program and services like Google Photo and Google Cloud.

Does this mean that achieving SHA-1 collisions is now within the grasp of most attackers? No, but it’s certainly within the capabilities of nation-states. In less than three months, the researchers plan to release the code that made their attack possible so other researchers can learn from it.

“Moving forward, it’s more urgent than ever for security practitioners to migrate to safer cryptographic hashes such as SHA-256 and SHA-3,” Google said in a blog post Thursday. “In order to prevent this attack from active use, we’ve added protections for Gmail and GSuite users that detects our PDF collision technique. Furthermore, we are providing a free detection system to the public.”

Starting with version 56, released this month, Google Chrome will mark all SHA-1-signed HTTPS certificates as unsafe. Other major browser vendors plan to do the same.

“Hopefully these new efforts of Google of making a real-world attack possible will lead to vendors and infrastructure managers quickly removing SHA-1 from their products and configurations as, despite it being a deprecated algorithm, some vendors still sell products that do not support more modern hashing algorithms or charge an extra cost to do so,” saidDavid Chismon, senior security consultant at MWR InfoSecurity. “Whether this happens before malicious actors are able to exploit the issue for their benefit remains to be seen.”

More information about the attack, which has been dubbed SHAttered, is available on a dedicated website and ina research paper.

Related content

  • featureMicrosoft's Patch Tuesday updates: Keeping up with the latest fixes Here's a look at the most recent Patch Tuesday release from Microsoft as well as a collection of recent updates so you can track what's changed.By Dan Muse13 Sep 20245 minsMicrosoftMicrosoft OfficeWindows 10
  • opinionSeptember’s Patch Tuesday update fixes 4 zero-days With its latest Patch Tuesday release, Microsoft released 79 updates for the Windows platform and addressed for separate zero-day vulnerabilities.By Greg Lambert13 Sep 202411 minsWindows SecurityMicrosoftWindows
  • opinionWhat North Korea's infiltration into American IT says about hiring Hundreds or thousands of North Koreans have illegally gotten jobs at US companies through a perfect storm of hiring failures.By Mike Elgan13 Sep 20246 minsTechnology IndustryHiringIT Jobs
  • featureMicrosoft 365 explained: Office 365, rebranded and expanded Initially an enterprise subscription that bundled together Windows, Office apps, and a variety of management tools, Microsoft 365 has morphed into something harder to define. Here’s everything you need to know about Microsoft’s productiviBy Matthew Finnegan12 Sep 202420 minsMicrosoftMicrosoft 365Microsoft Office
  • Podcasts
  • Videos
  • Resources
  • Events

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.

The SHA1 hash function is now completely unsafe (2024)
Top Articles
The relationship between political instability and stock market performance: An analysis of the MSCI index in the case of Pakistan
Binance founder Changpeng Zhao sentenced to 4 months in prison after plea deal
Katie Nickolaou Leaving
Bj 사슴이 분수
Shoe Game Lit Svg
Live Basketball Scores Flashscore
Alan Miller Jewelers Oregon Ohio
Practical Magic 123Movies
Craigslist Free Stuff Appleton Wisconsin
Craigslist In Fredericksburg
Ou Class Nav
Tabler Oklahoma
Blog:Vyond-styled rants -- List of nicknames (blog edition) (TouhouWonder version)
This Modern World Daily Kos
Conan Exiles Colored Crystal
Unit 33 Quiz Listening Comprehension
Samantha Lyne Wikipedia
Rachel Griffin Bikini
Parent Resources - Padua Franciscan High School
No Hard Feelings - Stream: Jetzt Film online anschauen
EASYfelt Plafondeiland
Culver's Flavor Of The Day Taylor Dr
Grimes County Busted Newspaper
Craigslist Lewes Delaware
Snohomish Hairmasters
Marilyn Seipt Obituary
Sensual Massage Grand Rapids
Wolfwalkers 123Movies
Xxn Abbreviation List 2023
Progressbook Newark
Myra's Floral Princeton Wv
Advance Auto Parts Stock Price | AAP Stock Quote, News, and History | Markets Insider
Rust Belt Revival Auctions
Bt33Nhn
ShadowCat - Forestry Mulching, Land Clearing, Bush Hog, Brush, Bobcat - farm & garden services - craigslist
Log in or sign up to view
Why The Boogeyman Is Rated PG-13
Pensacola 311 Citizen Support | City of Pensacola, Florida Official Website
Metro By T Mobile Sign In
How to Destroy Rule 34
Craigslist Boats Eugene Oregon
450 Miles Away From Me
Best Restaurant In Glendale Az
Bones And All Showtimes Near Johnstown Movieplex
Froedtert Billing Phone Number
Lcwc 911 Live Incident List Live Status
Wunderground Orlando
Exam With A Social Studies Section Crossword
Ferhnvi
Ups Customer Center Locations
About us | DELTA Fiber
Game Like Tales Of Androgyny
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5854

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.