Crypto researchers break SHA-1

Talk about "WhatEVER !"..
Post Reply
Message
Author
egibbs
Senior Member
Senior Member
Posts: 896
Joined: Tue Apr 27, 2004 6:05 am
Location: New Jersey

Crypto researchers break SHA-1

#1 Post by egibbs » Thu Feb 17, 2005 7:45 am

http://www.theregister.co.uk/2005/02/17 ... ng_broken/

This was all over the news yesterday. I only mention it here because the TCPA embedded security chip in our TPs implements SHA-1 in hardware.

Practical implications are probably nil right now - if someone has physical access to your machine, can read the hash of your passphrase from the chip, and has a supercomputer they could likely brute force (given enough time) a phrase that computes to the same hash and would unlock your machine.

But these types of discoveries imply unknown holes in the algorithm - this was not supposed to be possible. In the past such discoveries have sometimes served as wedges to crack the algorithm open, and been followed quickly by discovery of much more serious cracks.

Ed Gibbs

Batuta
Junior Member
Junior Member
Posts: 399
Joined: Fri Feb 18, 2005 12:55 pm

#2 Post by Batuta » Fri Feb 18, 2005 5:56 pm

...
Last edited by Batuta on Thu May 12, 2005 9:29 am, edited 1 time in total.
Die Hard OS/2

Moroner
Freshman Member
Posts: 60
Joined: Mon Jun 21, 2004 4:10 pm
Location: The Netherlands

#3 Post by Moroner » Fri Feb 18, 2005 6:30 pm

This attack is currently quite theoretical: It reduces the collision detection strength from 80 to 69 bits, saving a nice factor of 2048 in the process. The trick of course, is to generate collisions that are plausible: You cannot simply change 80 random bits in a 20 KByte text, it must look "natural". And this is much harder to achieve. So for now, SHA-1 is still practically safe, unless this attack yields new breakthroughs.

egibbs
Senior Member
Senior Member
Posts: 896
Joined: Tue Apr 27, 2004 6:05 am
Location: New Jersey

#4 Post by egibbs » Fri Feb 18, 2005 6:33 pm

Right - and if anyone signs a document electronically today that could wind up in court a year or two from now (when SHA-1 cracking software for dummies will be all over the net) they are a fool.

It's safer to treat anything encrypted with an unbreakable code as probably safe for 6 months to a year. After that all bets are off.

Batuta
Junior Member
Junior Member
Posts: 399
Joined: Fri Feb 18, 2005 12:55 pm

#5 Post by Batuta » Sat Feb 19, 2005 1:01 am

...
Last edited by Batuta on Thu May 12, 2005 9:29 am, edited 1 time in total.
Die Hard OS/2

Moroner
Freshman Member
Posts: 60
Joined: Mon Jun 21, 2004 4:10 pm
Location: The Netherlands

#6 Post by Moroner » Sat Feb 19, 2005 7:53 am

Short explanation of digital signatures:
1. You have a document you want to sign
2. You compute a hash over that document
3. You use public key encryption to sign that hash

There are a few attacks possible:
1. You find a hash collision, and use it to forge the document.
2. You break the public key encryption (If you can do that, claim your 100 000 USD at RSA Securities right now ;-) )
3. You fool the real signer to sign your forged document

All of these attacks are not simple. 3) is probably the easiest, given how many holes in security protocols have been found with Casper (a protocol anlysis tools developed at Oxford University). A variant on 3) is that, after you found a collision, you prepare two documents, get one signed, and pretend that actually the other was signed. But, as said previously, you still have the problem of getting a "natural" looking hit.

For documents already posted, you can either break PKE. This will probably remain hard until quantum computers arrive, and then we will have to revert to one-time-pads. Or you can find a hash collision to an existing hash value. And this doubles the number of bits you have to search, making it completely unfeasable with today's technology. So these will be safe, until there are further breakthroughs.

For some further explanations on hash collisions, have a look at http://www.cryptography.com/cnews/hash.html

Batuta
Junior Member
Junior Member
Posts: 399
Joined: Fri Feb 18, 2005 12:55 pm

#7 Post by Batuta » Sat Feb 19, 2005 9:33 pm

...
Die Hard OS/2

Post Reply

Return to “Off-Topic Stuff”

Who is online

Users browsing this forum: No registered users and 2 guests