Anyone know more about this?

Begin forwarded message:

From: "Steven W. Teppler"
Date: August 13, 2007 4:41:56 PM PDT
To: [EMAIL PROTECTED]
Subject: Potential SHA 1 Hack Using Distributed Computing - Near Miss(es) May be Good Enough

From DarkReading, via Heise Security:


Cracking SHA-1 using distributed computing



Researchers at the Technical University of Graz
<http://portal.tugraz.at/pls/portal/url/page/TU_Graz>  have launched a
distributed computing project to find a new kind of vulnerability in the SHA-1 hash algorithm, which is used in numerous Internet applications such as encrypted connections and e-mails. Hash algorithms like SHA-1 perform a
sequence of mathematical operations on a block of data, for example a
message, which generates a unique fixed length value or "digest" from the arbitrary length message. Even minor changes to the original message have a
great effect on the digest, making changes easy to detect.


<http://oas.wwwheise.de/RealMedia/ads/adstream_lx.ads/www.heise.de/ security_ uk/news/343347123/Middle1/he-test-contentads/zaehler.html/ 343433386136643834
36633065623730?_RM_EMPTY_>   

However, collisions do occur: the algorithm produces the same digest for two or more different messages. In the presence of a collision, the variant messages involved cannot be distinguished from each other using the digest, although indeed most of the variant messages would often not be very useful, as they would consist of human-meaningless data. But finding collisions is excessively arduous using simplistic methods. However, in 2005, Chinese researchers demonstrated that the search for collisions can in principle be optimized so that the number of attempts falls below the theoretical minimum of 280. Then around <http://www.heise-security.co.uk/news/77244> a year ago a way to control the content of a possibly quite substantial proportion of
the manipulated message was made public.

The cryptologists at the Technical University of Graz are taking a slightly different approach: they are not looking directly for collisions, but for "near misses", where SHA-1 produces very similar digests from two different
messages. They believe that two near misses with the same minimal
differences might actually compensate for each other, producing the same
outcome as a true collision.

To test this theory, the researchers have launched
<http://boinc.iaik.tugraz.at/sha1_coll_search/> a distributed computing project. The trusty old Boinc <http://boinc.berkeley.edu/> client known from other such projects such as [EMAIL PROTECTED] is also being used in Graz. Those
who wish to help find collisions are advised to read the manual on the
project's website.

The successor of SHA-1 is currently being redeveloped from scratch
<http://www.heise-security.co.uk/news/84229>  because the algorithms
originally intended to be used in the SHA-2 family all are similar to SHA-1
and therefore vulnerable to the same kind of attacks.

Steven


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to