Google Cracks Old Crypto Algorithm, SHA-1 Now Unsafe: Why You Should Panic

ADVERTISEMENT

Google has announced that it has cracked the Secured Hash Algorithm 1 (SHA-1) cryptographic function, marking a milestone that spells both danger and opportunity for the computing world.

The unprecedented feat was achieved through the real-world collision attack on the cryptographic algorithm, which led to the production of two PDF files that contain similar SHA-1 signature.

What Is SHA-1?

As a mathematical algorithm, the SHA-1 is capable of transforming a digital object into a hash or its representation. For example, if the algorithm is used to convert or verify an email signature, the SHA-1 will transform it into a string of 40 characters.

The elaborate combination of numbers and the way SHA-1 attaches such strings into digital objects makes it an effective mechanism to authenticate digital files. Here, identical files can have the same SHA-1 hash but two different files cannot be identified with the same string of characters.

However, that is what exactly the researchers at Google were able to achieve. With help from peers at CWI Institute in Amsterdam, they successfully created two different files with the same SHA-1 footprint.

(Photo : Shattered)

Impact On Security

Google’s successful breach is a critical security issue because the SHA-1 function is currently used in financial processes. Specifically, the algorithm is said to be still widely used to validate credit card transactions. It is also employed to verify electronic documents and software updates.

“It is now practically possible to craft two colliding PDF files and obtain a SHA-1 digital signature on the first PDF file which can also be abused as a valid signature on the second PDF file,” the webpage dedicated to the initiative explained.

Google cited a specific example to demonstrate the breach’s impact. When one creates a rental agreement that involves a digital signature, it is now possible for one of the parties to create another rental agreement with different clauses or provisions but with the same valid signature.

SHA-1 Ban

To be fair, SHA-1, which was developed back in 1995, has already been labeled as unsafe. This was highlighted back in 2011 when the U.S. National Institute of Standards and Technology officially deprecated the algorithm especially in transactions conducted in federal agencies. Some companies have also followed suit especially after incidents involving the SHA-1 vulnerability affected even Apple. The algorithm was also partly blamed for the Dropbox hack that exposed 68 million user accounts.

Again, many companies still use it even after such bans. For example, Mozilla has allowed Symantec last year to issue a SHA-1 certificate to Worldpay just to accommodate more than 10,000 payment terminals that have not been upgraded. These terminals were given the green light to communicate with servers that process consumer transactions.

According to Google, many applications also still use the algorithm and it hopes that its practical attack will serve as an opportunity for the industry to adopt safer alternatives. In the meantime, you can protect yourself from risk by using Chrome for your transactions because the browser automatically treats those with SHA-1 certificates as insecure.




© 2017 Tech Times, All rights reserved. Do not reproduce without permission.

(Via TechTimes)

ADVERTISEMENT

ADVERTISEMENT
Just in:
Downpours in Oman and UAE Likely Amplified by Warming Planet // Lee Chong Wei Shows Up On Chinese Hot cultural Talk Show “SHEDE Wisdom Talents”, Talking About “Crossing The Hill” // TPBank and Backbase Clinch ‘Best Omni-Channel Digital CX Solution’ at the Digital CX Awards 2024 // Booming Region Fuels Innovation Surge // Lai & Turner Law Firm PLLC Welcomes Eric Strocen as Director of Family Law Division // Cobb’s Game-Changer: Introducing One-Stop Event Transport Management Solution // PolyU forms global partnership with ZEISS Vision Care to expand impact and accelerate market penetration of patented myopia control technology // Andertoons by Mark Anderson for Thu, 25 Apr 2024 // Cairo Recognizes Arab World’s Creative Luminaries at Award Ceremony // Dubai Gears Up for Second FinTech Summit as Funding Surges // World Intellectual Property Day: OPPO Maintains Top 10 Global IP Ranking for Fifth Consecutive Year // Why Lok Sabha Election For 20 Seats In Kerala Is Crucial For Future Of Left In Indian Politics? // Ministry of Agriculture Supports Taiwanese Tea’s Entry into Singapore Market to Boost Global Presence // Etihad Airways Announces Paris Service with A380 // Telecom Giant Du Eyes Crypto Integration for FinTech Platform // Galaxy Macau’s Sakura Cultural Festival Kicked off in Splendor // DIFC Courts Cement Role as Top English Dispute Resolution Choice // Prince Holding Group’s Chen Zhi Scholarship Clinches Silver Stevie for CSR Excellence at Asia-Pacific Stevie Awards // ByteDance Eyes US Shutdown for TikTok // GE Jun, Chairman and CEO of TOJOY, Delivers an Inspiring Speech: “Leaping Ahead Again” //