It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Today, more than 20 years after of SHA-1 was first introduced, we are announcing the first practical technique for generating a collision. This represents the culmination of two years of research that sprung from a collaboration between the CWI Institute in Amsterdam and Google. We’ve summarized how we went about generating a collision below. As a proof of the attack, we are releasing two PDFs that have identical SHA-1 hashes but different content.
Link
This industry cryptographic hash function standard is used for digital signatures and file integrity verification, and protects a wide spectrum of digital assets, including credit card transactions, electronic documents, open-source software repositories and software updates.
It is now practically possible to craft two colliding PDF files and obtain a SHA-1 digital signature on the first PDF file which can also be abused as a valid signature on the second PDF file.
Shattered More info and proof
originally posted by: Flyingclaydisk
Sounds intriguing, but honestly, I have no idea what you just posted! (????)
originally posted by: Throes
SHA-512 is available as well so this will just end up with vulnerability updates and patches to make sure applications move up.
Secure Hash Algorithm 1 or SHA-1 is a cryptographic hash function designed by the United States National Security Agency and released in 1995. The algorithm was widely adopted in the industry for digital signatures and data integrity purposes. For example, applications would use SHA-1 to convert plain-text passwords into a hash that would be useless to a hacker, unless of course, the hacker could reverse engineer the hash back into the original password, which they could not. As for data integrity, a SHA-1 hash ensured that no two files would have the same hash, and even the slightest change in a file would result in a new, completely unique hash.
According to Wikipedia, the ideal cryptographic hash function has five main properties:
-It is deterministic so the same message always results in the same hash.
-It is quick to compute the hash value for any given message.
-It is infeasible to generate a message from its hash value except by trying all possible messages.
-A small change to a message should change the hash value so extensively that the new hash value appears uncorrelated with the old hash value.
-It is infeasible to find two different messages with the same hash value.
There are codes which are "unbreakable".
originally posted by: Flyingclaydisk
Sounds intriguing, but honestly, I have no idea what you just posted! (????)
originally posted by: roadgravel
a reply to: Flyingclaydisk
There are codes which are "unbreakable".
The One Time Pad using very random data for the key is considered unbreakable in a realtime setting.
If a way to find prime factors quickly is found then public key encryption is broken.
Much of compromising encryption is done by means other than the algorithm itself.
originally posted by: Flyingclaydisk
a reply to: roadgravel
Yes, this is one concept I was referring to.