Feeds

Crypto attack puts digital sig hash on collision course

SHA-1, your time is near

High performance access to file storage

Cryptographers have found new chinks in a widely-used digital-signature algorithm that have serious consequences for applications that sign email, validate websites, and carry out dozens of other online authentication functions.

The researchers, from Macquarie University in Sydney, Australia, found a way to break the SHA-1 algorithm in significantly fewer tries than previously required. Although the hash function was previously believed to withstand attempts numbering 263, the researchers have been able to whittle that down to 252, a number that puts practical attacks well within grasp of well-funded organizations.

Secure hashing algorithms are designed to reduce text or digital files to a unique series of letters and numbers that is often compared to the document's signature. The findings, which were published Wednesday here (PDF), mean it's easier to create what cryptographers call collisions in SHA-1, in which two different sources share the same the same output.

"I'm expecting that we'll start seeing SHA-1 collisions before the end of the year, if not sooner," said Paul Kocher, president and chief scientist at Cryptography Research, a San Francisco-based consultancy. "For applications that fail because of collisions, you need to be really worried."

Indeed, it was collisions in the now-disgraced MD5 algorithm that allowed independent researchers last year to poke holes in the internet's digital certificate system by forging counterfeit credentials needed to impersonate websites that rely on the security measure. The discovery sent certificate authorities such as VeriSign's RapidSSL scrambling to change the way they issue SSL, or secure sockets layer, certificates.

Other hashes, including SHA-0 and MD4, have also been demonstrated to be weak enough to generate collisions using relatively modest means. With the latest findings, that list is steadily growing.

"Now, SHA-1 has some of the same problems that MD5 has had creeping up on it for a while," Kocher said.

The 160-bit output of SHA-1 should in theory allow hashes to withstand 280 operations without generating a collision. That number came down to 269 and later to 263 as researchers discovered ways to exploit weaknesses in the algorithm. But until now, only the most elite government organizations had the computing power to do that.

Cryptographers have long recognized that advances in computing power and research into weaknesses of various hashing algorithms jeopardize the reliability of digital signatures. Last year, the National Institute of Standards and Technology commenced an open competition to create a new algorithm. The winning entry should be one that is able to withstand attack and able to generate hashes quickly and without consuming too many computer resources. It will offer hashes with as many as 512 bits, enough to (at least theoretically) withstand 2256 attempts to create a collision.

The new attack technique combines what's known as a non-linear differential path with a boomerang attack. It decreases the cost of a collision attack by a factor of more than 2,000 compared with previous methods. The paper has not yet been peer reviewed.

The method works only for collisions, in which an attacker is able to control both messages that are hashed. SHA-1 is still believed to resist what's known as pre-image attacks, in which an attacker tries to create one message that generates the same hash value as a pre-determined message. ®

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.