Categories: Security

Google Researchers Cracked Trusted Internet Security Tool

It has been twenty years since SHA-1 was first introduced. SHA-1 was created back in 1995 by the National Security Agency (NSA). It was a part of the Digital Signature Algorithm, and like other hashes, it would take the entered message and convert it to a string of letters and numbers that served as a cryptographic fingerprint of that particular message. No two messages would be alike. A Google team of researchers recently announced that they managed to break the SHA-1 cryptographic algorithm.

Read More: Advanced Protection: How to Increase Your Privacy on Android

Cracking the SHA-1

Despite warnings of the algorithm’s effectiveness, it was still widely used. According to the researchers, the “SHAttered” attack, as they call it, is 100,000 times faster than a brute force attack. One researcher stated: “This attack required over 9,223,372,036,854,775,808 SHA1 computations. This took the equivalent processing power as 6,500 years of single-CPU computations and 110 years of single-GPU computations.”

That’s no small number. Even though security groups have stated the ineffectiveness of SHA-1 throughout the last decade, no one dealt with the underlying issues of a fading piece of technology. Microsoft had released a statement back in 2013 where they stated that SHA-1 would not be accepted after 2016.

Now everyone who ignored the warnings is in a race against time. They have a mere ninety days before Google releases the proof-of-concept code (PoC). This document will define the coding that the company used to create the collision attack. After that, everyone will have access to the information and can make their own pair of PDFs that hash to the same SHA-1. It’s bad news for services that have been reliant on the aging algorithm. For the many services that still use the now proven insecure SHA-1, they have three months to replace it with a more suitable and secure option like SHA-256 and SHA-3.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

How to identify a spy app on your smartphone

In the United States, the use of spyware apps is a growing concern, affecting mobile…

56 years ago

5 trending digital scams: how AI is making fraud more dangerous

Every day, millions of mobile phone users receive malicious links through SMS, email, or social…

56 years ago

Pix Gains Momentum Abroad: Convenience and Security for Brazilian Travelers

Travel is about new experiences — and making payments without hassle is a crucial part…

56 years ago

Malicious links: what they are and how to protect yourself

Every day, millions of  cell phone users receive malicious links via SMS, email, or social…

56 years ago

Zero Trust: what it is, why it matters, and how dfndr security protects your phone with this concept

Have you heard of Zero Trust? The term is one of the most  important trends…

56 years ago

5 Reasons to Use Biometrics to Secure Mobile Devices

Mobile devices have become essential tools in both our personal and professional lives, but they…

56 years ago