ADVFN Logo ADVFN

We could not find any results for:
Make sure your spelling is correct or try broadening your search.

Trending Now

Toplists

It looks like you aren't logged in.
Click the button below to log in and view your recent history.

Hot Features

Registration Strip Icon for charts Register for streaming realtime charts, analysis tools, and prices.

GOOG Alphabet Inc

168.76
0.30 (0.18%)
Pre Market
Last Updated: 10:27:43
Delayed by 15 minutes
Share Name Share Symbol Market Type
Alphabet Inc NASDAQ:GOOG NASDAQ Common Stock
  Price Change % Change Share Price Bid Price Offer Price High Price Low Price Open Price Shares Traded Last Trade
  0.30 0.18% 168.76 168.74 168.77 21,259 10:27:43

Google Team Cracks Longtime Pillar of Internet Security

23/02/2017 1:29pm

Dow Jones News


Alphabet (NASDAQ:GOOG)
Historical Stock Chart


From May 2019 to May 2024

Click Here for more Alphabet Charts.
By Robert McMillan 

A cryptographic technology long central to internet security has been dealt a knockout blow by researchers at Google and a Dutch research institute.

In a paper to be published Thursday, the researchers demonstrate an attack on an algorithm called SHA-1, which has been widely used over the past 20 years to verify the authenticity of digital documents.

SHA-1 has worked behind the scenes to guarantee that the websites people visit are, in fact, are what they claim to be. It is what is known as a "hash function"--a technique for turning any digital document into a unique 40-digit sequence of letters and numbers. That digital fingerprint serves as a quick way of authenticating digital certificates, passwords, even office documents.

Called a "collision attack," the researchers' technique is something cryptographers have contemplated since 2005, when researchers in China reported the first significant flaws in SHA-1. Until now, "it was only a theoretical attack," said Marc Stevens, a researcher with the Centrum Wiskunde & Informatica in Amsterdam, which collaborated with Alphabet Inc.'s Google unit on the effort. "We actually did it."

Once the most widely used algorithm of its type, SHA-1 is no longer considered state of the art. It hasn't been used in the production of digital certificates for websites since January 2016, and is only "lightly used" by publicly available sites, according to Ivan Ristic, founder of security vendor Qualys Inc.'s SSL Labs. Browser makers are rolling out changes now that mark SHA-1 digital certificates as untrustworthy.

But Mr. Stevens and Elie Bursztein, his collaborator at Google, said the algorithm is still used often, particularly for validating the integrity of documents. Mr. Ristic and other security experts say, for example, that SHA-1 is likely to be found behind corporate firewalls on devices where software upgrades are difficult, such as point-of-sale terminals in retail stores.

In their attack, the researchers were able to create two different documents that generated identical SHA-1 hash values, essentially allowing hackers to swap out an authenticated digital certificate for something else. It is the kind of swap that could trick a computer into believing a malicious website was Google.com or that a virus was legitimate software.

It was no easy feat. It took two years of painstaking mathematical and software development work and close to 7,000 years of chip processing time to crack the code, with CWI contributing the mathematical expertise and a team of collaborators at Google helping with the software and computing power.

The fact that this SHA-1 attack has moved from the realm of the theoretical to the practical is a major development for cryptographers because it is likely the most computationally intensive cryptographic problem ever solved, said Dan Boneh, a computer science professor at Stanford University.

Security professionals need to take note too, he added. "A lot of [chief security officers] in various organizations are going to freak out and they're going to drop what they're doing and they're going to buy new certificates," he said.

Now that they have solved the problem, Messrs. Stevens and Bursztein said they believe that a subsequent attack would take only about a month and cost about $100,000, using publicly available cloud-computing servers. That would put it within range of well-funded adversaries.

Google will wait 90 days before releasing the code behind its attack and it has also developed a free system that will detect use of this technique in files, the company said.

With its $100,000 computational price tag, the SHA-1 attack is unlikely to be widely used, but such advanced techniques have appeared in at least one previous attack. In 2012, Microsoft Corp. disclosed that a collision attack was used to disguise malicious software called Flame as a legitimate program on Windows systems. Flame was eventually linked to a state-sponsored attack on several Middle Eastern countries.

Write to Robert McMillan at robert.mcmillan@wsj.com

 

(END) Dow Jones Newswires

February 23, 2017 08:14 ET (13:14 GMT)

Copyright (c) 2017 Dow Jones & Company, Inc.

1 Year Alphabet Chart

1 Year Alphabet Chart

1 Month Alphabet Chart

1 Month Alphabet Chart

Your Recent History

Delayed Upgrade Clock