Digital encryption standard flawed

Archived on Sat Feb 19 15:26:29 2005

An encryption standard widely used in digitally signing documents and programs has a flaw in it that could allow for the creation of forgeries, sources said Wednesday.

In a three-page research note seen by CNET News.com, three Chinese scientists--Xiaoyun Wang and Hongbo Yu of Shandong University and Yiqun Lisa Yin, a visiting researcher at Princeton University--stated they have found a way to significantly reduce the time required to break an algorithm, known as the Secure Hashing Algorithm, or SHA-1, that is widely used for digitally fingerprinting data files.

Other cryptographers who have seen the document said that the results seemed to be genuine.

"At this point I can't tell if the attack is real, but the paper looks good and this is a reputable research team," Bruce Schneier, a cryptographer and chief technology officer for Counterpane Internet Security, said on his Web site.

An attacker could use the flaw to create two documents or programs that have the same digital fingerprint, also known as a hash; one file could be a legitimate version of the data, while the other could be a forgery. For example, code signing--where a program is posted online along with its SHA-1 fingerprint as a way to guarantee its integrity--would essentially be rendered meaningless by this attack.

This causes problems for digital signatures because signing documents is a two-step process. First, a digital fingerprint, or condensed version of the document, is created. Then public-key encryption is used to sign that hash. If two different documents create the same hash, then the process breaks because no one can prove which document was signed.

The latest attack made use of a cryptoanalysis attack against a similar, but more easily breakable, algorithm known as SHA-0.

While the problems--if confirmed--could lead to SHA-1 being phased out by the government, the effects of the break may not be dire, said Paul Kocher, a cryptographer and president of Cryptography Research.

"This is feasible if you have thousands of computers at your disposal," he said, at his company's booth in the exhibition hall of the RSA security conference in San Francisco. Moreover, the attack is a problem only if an untrustworthy source is generating the data that is being signed. That person could have generated two copies of the data: one public version that will be signed, and a forgery, or malicious version, that will be kept secret.

The break of the full SHA-1 algorithm reduces the complexity of producing a "collision"--or matching hash value--by a factor of about 2,000. If a cluster of computers could handle 1 million hash values every second, it would still take about 19 million years to find two different documents whose digital fingerprints match.

That means the situation is serious but not desperate, Counterpane's Schneier said, adding that companies have about a year before attacks become feasible enough to cause concern.


"The industry will produce better solutions really quick," he said, warning the industry and government not to tarry long. "Remember the motto of the (National Security Agency): Attacks only get better; they never get worse."


http://news.com.com/Researchers+Digital+encryption+standard+flawed/2100-1002_3-5579881.html

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值