Researchers break once-standard identification algorithm

Researchers at Google and the Amsterdam-based research center CWI have developed a first-of-its-kind technique to trick a common verification algorithm known as SHA-1.

SHA-1 provides a signature used to verify that files have not been tampered with and prove that websites are not being impersonated. SHA-1 is out of favor in the computer world — most programmers now implement the newer algorithms — but was used for a long enough time that many sites and products still make use of it. 

The technique, which the researchers are calling “SHAttered,” is what is known as a collision attack: a way of manufacturing items that produce the same signature as an item attackers are trying to mimic. 

{mosads}Companies like Google and even United States government agencies like the National Institute of Standards and Technology have long advocated that websites drop SHA-1. Google’s web browser Chrome no longer recognizes SHA-1 as a valid security technique. 

The SHAttered attack is around 100,000 times faster than trying to guess all the possible unique variables entered into SHA-1 to create signatures. But SHAttered is still a resource-intensive attack. While it might be practical for a malicious government, it requires too much computational power for normal computers. 

Tags

Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. regular

 

Main Area Top ↴

 

Main Area Middle ↴
Main Area Bottom ↴

Most Popular

Load more

Video

See all Video