Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

SHA-1 Collisions for Meaningful Messages 128

mrogers writes "Following on the heels of last year's collision search attack against SHA-1, researchers at the Crypto 2006 conference have announced a new attack that allows the attacker to choose part of the colliding messages. "Using the new method, it is possible, for example, to produce two HTML documents with a long nonsense part after the closing </html> tag, which, despite slight differences in the HTML part, thanks to the adapted appendage have the same hash value." A similar attack against MD5 was announced last year."
This discussion has been archived. No new comments can be posted.

SHA-1 Collisions for Meaningful Messages

Comments Filter:
  • by Apage43 ( 708800 ) on Sunday August 27, 2006 @10:12AM (#15989328) Homepage
    Where's the "Correct filesize" kept? If it's stored in the document, it's still possible (Though more difficult) to change it and make a collision.
  • This is a big deal (Score:5, Insightful)

    by gweihir ( 88907 ) on Sunday August 27, 2006 @10:12AM (#15989331)
    One thing is that cryptographic hash functions should be easier to make secure than ciphers. At leaste that is what many cryptogtaphers thought. The other is that up to now you could rely on SHA-1 to be collision resistant, no matter what. The argument that you have a large part of the message being "garbage" does not give any real security. Many, many applications can still be attacked, and they need not even be broken for that.

    While expected since last year, selecting and using crypto-hashes just got a lot more difficult and error prone.
  • by Anonymous Coward on Sunday August 27, 2006 @10:25AM (#15989370)
    One thing is that cryptographic hash functions should be easier to make secure than ciphers.

    How so? By default, a hash is breakable since its reducing the infinite input into a finite output. Ciphers do not.
  • by kassemi ( 872456 ) on Sunday August 27, 2006 @10:31AM (#15989391) Homepage

    Whirlpool [terra.com.br] is a good choice these days. It's longer than most of the hashes out there, but I don't believe there have been any attacks yet demonstrated against it.

    For those pythoners out there I wrote a quick wrapper for it [kepty.com] that should get you started. Excuse any site errors and just hit refresh

  • by Xugumad ( 39311 ) on Sunday August 27, 2006 @10:38AM (#15989413)
    I have to say, trusting SHA-1 to do what it says on the tin, is not incompetent. Naive, sure, but not incompetent.
  • by shokk ( 187512 ) <ernieoporto.yahoo@com> on Sunday August 27, 2006 @11:28AM (#15989602) Homepage Journal
    The problem is that your old keys and the messages they encrypted are available for cracking now and forever. Most people only encrypt important messages, which are easy to look for in a mailbox, and at a later time could be easy to crack. There's probably even a good change the data in that mail could still be important.

    Now, if all emails were encrypted, it would be harder to immediately see what messages in a mailbox deserve your attention. But then at a later date CPU speed may make that a negligible difference.
  • by Anonymous Coward on Sunday August 27, 2006 @12:46PM (#15989947)
    Even if you find that set, you don't overcame the most hard thing to do : have it real malicious code. Because, well, that's a hell to do a SHA-1 collision, and it's even more of a hell to do it with a code purposed to do anything usable and not just random crap.
  • by FLEB ( 312391 ) on Sunday August 27, 2006 @01:18PM (#15990066) Homepage Journal
    In cases of verification (rather than security) isn't more specificity better? I'd agree that double-hashing something like a secret password causes a loss of security, but if you're double-hashing a file to verify its contents, more specificity means it's harder to get a match by garbage-packing.

    I really am asking-- I'm not all that up on the guts-and-wherefores of encryption/hashing, and I've wondered about this question as well.
  • easy tiger... (Score:3, Insightful)

    by Anonymous Coward on Sunday August 27, 2006 @08:50PM (#15991546)
    I think the key point is this:

    No SHA1 collisions have ever been published

    whether or not they have been found is a different matter entirely.

There are two ways to write error-free programs; only the third one works.

Working...