Menu
SHA-1 hashing algorithm could succumb to $75K attack, researchers say

SHA-1 hashing algorithm could succumb to $75K attack, researchers say

It's time to retire the SHA-1 hashing algorithm, as it is now cheaper than ever to attack, researchers say

Researchers have found a new way to attack the SHA-1 hashing algorithm, still used to sign almost one in three SSL certificates that secure major websites, making it more urgent than ever to retire it, they said Thursday.

SHA-1 is a cryptographic hashing function designed to produce a fingerprint of a document, making it easy to tell if a document has been modified after the fingerprint was calculated.

Weaknesses had already been identified in SHA-1, and most modern Web browsers will no longer accept SSL certificates signed with it after Jan. 1, 2017. That date was chosen based on the ever-decreasing cost of the computing power required to attack the algorithm.

The researchers who developed the latest attack, though, think SHA-1 should be phased out sooner, as they estimate it now only costs between US$75,000 and $120,000 to mount a viable attack using freely available cloud-computing services. Previously, Intel researcher Jesse Walker had estimated it would take until 2018 for the cost to reach this level, which he suggested was well within the reach of criminal syndicates.

Coincidentally, the Certification Authority/Browser Forum, which agrees policies on support for SSL certificates, is examining proposals to continue issuing SSL certificates signed with SHA-1 beyond the previously agreed cut-off date. Certification Authorities (CAs) issue and vouch for certificates used to secure websites.

The researchers said they strongly recommended that proposal be rejected.

Hashing agorithms like SHA-1 are considered secure if it is vastly more difficult to create a document that matches a given hash than it is to calculate a hash from a given document.

If someone can create two different files that have the same hash, it's possible to digitally sign one -- say, a benign downloadable app -- and then later replace it with a malicious one in a way that electronic audit trails would be unable to identify. This is called an identical-prefix attack.

Even more serious is if someone can take an existing document with a known hash, and create a new file matching that hash, a so-called known prefix attack. This would allow the undetectable replacement not only of apps identified by their hashes, but also of SSL security certificates signed with them.

The attack on on SHA-1's compression function was described by Thomas Peyrin of Nanyang Technological University (NTU) in Singapore, Marc Stevens of the Centrum Wiskunde and Informatica in the Netherlands and Pierre Karpman of both NTU and Inria in France. It goes through the message block by block, calculating a hash for each block combined with the hash derived from all the previous blocks. In SHA-1 this is done in 80 "rounds", and the three say that their attack is the first to break all 80 rounds.

Happily, the researchers have only shown a way to simplify an identical-prefix attack on SHA-1, meaning it is not yet possible to generate fake SSL certificates allowing the impersonation of arbitrary websites.

"This is still far from being able to create a rogue CA, as such an attack would require a stronger type of collision," said Peyrin, one of the authors of the research paper.

"We advise the industry to not play with fire, and accelerate the migration process toward SHA2 and SHA3, before such dramatic attacks become feasible," Peyrin concluded.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Reseller News launches inaugural Hall of Fame lunch

Reseller News launches inaugural Hall of Fame lunch

Reseller News welcomed 2015 and 2016 inductees - Darryl Swann, Dave Rosenberg, Gary Bigwood, Keith Watson, Mike Hill and Scott Green - to the inaugural Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed how the channel can collectively work together to benefit New Zealand, the Kiwi skills shortage and the future of the industry. Photos by Maria Stefina.

Reseller News launches inaugural Hall of Fame lunch
Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Show Comments