{"id":6780,"date":"2017-02-24T14:00:44","date_gmt":"2017-02-24T22:00:44","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/24\/news-571\/"},"modified":"2017-02-24T14:00:44","modified_gmt":"2017-02-24T22:00:44","slug":"news-571","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/24\/news-571\/","title":{"rendered":"SHA-1: 9,223,372,036,854,775,808 Reasons Not To Worry"},"content":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 24 Feb 2017 20:52:12 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-300x169.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-300x169.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-768x432.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-1024x576.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-640x360.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-900x506.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-440x248.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-380x214.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>The SHA-1 hash function is broken. This isn\u2019t news. What is news is that a <a href=\"http:\/\/shattered.it\">practical attack has been demonstrated<\/a>\u00a0 Keep in mind that \u201cpractical\u201d is used in cryptographers terms and those terms don\u2019t necessarily have an impact on your daily IT use.<\/p>\n<p><a href=\"http:\/\/www.techmeme.com\/170223\/p12#a170223p12\">The news<\/a> has been making the rounds as IT teams, journalists, and everyday users are trying to understand the potential impact. This is an understandably difficult announcement to grasp. Encryption is complex. Even the simplest explanations (<a href=\"https:\/\/www.cs.princeton.edu\/~felten\/encryption_primer.pdf\">PDF<\/a>) are still tough to handle.<\/p>\n<p>It\u2019s this deeply technical combination of mathematics and computer science that make cryptography a foundational pillar of digital security and one of it\u2019s most challenging aspects.<\/p>\n<h2>SHA-What?<\/h2>\n<p>The SHA-1 algorithm is one of many different hash functions. A hash function is a one-way method for taking an arbitrary set of data and reducing it down to a fixed size that we call a digest or a hash. Similar to the way that a DNA sequence represents a whole person\u2026sort of (I warned you it was complex).<\/p>\n<p>The key take away is that every hash is supposed to be unique. If you change the original data in any way, you <b>should<\/b> get a completely different hash. This announcement proves that this is no longer true for SHA-1.<\/p>\n<p>That\u2019s an important development because we use hash functions for a lot of different things. A few simple examples:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>checking that a file your downloaded was the one your intended to<\/li>\n<li>making sure that a security certificate (like those used on secure websites) is valid<\/li>\n<li>as a digital signature<\/li>\n<li>verifying passwords<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Hash functions are important in the digital world. Anytime there\u2019s a security issue with one, it\u2019s a big deal.<\/p>\n<p>Or is it?<\/p>\n<h2>Limited Lifespan<\/h2>\n<p>It turns out that we\u2019ve known that this announcement would happen for a long time. The only question was the exact timing. Brute force attacks (trying every possible combination until you find the right one) were an expected attack method. Because they would take so long to run (12,000,000+ years on a single GPU) they weren\u2019t considered feasible\u2026for obvious reasons.<\/p>\n<p>The announcement from the teams at <a href=\"https:\/\/g.co\/research\/protect\">Google<\/a> and <a href=\"https:\/\/www.cwi.nl\/research-groups\/Cryptology\">CWI<\/a> demonstrates a new attack that is 100,000 times more efficient. Bringing the total attack time <b>down<\/b> to 9,223,372,036,854,775,808 computations or 110 years on a single GPU running 24\/7.<\/p>\n<p>As you can imagine, with easy access to cloud resources you can run the attack much faster than that if you have the resources. The teams estimate it would take at least $110,000 to successfully execute.<\/p>\n<p>Given that price tag, this limits the number of attackers who can leverage this technique. For most organizations this doesn\u2019t change the threat model. This announcement will have more impact at the nation state level where resources aren\u2019t such a concern.<\/p>\n<p>The good news here is that these standards are made with an explicit understanding that the math won\u2019t hold up forever and that computation is always getting cheaper.<\/p>\n<p>That\u2019s why the SHA-2 family of algorithms was <a href=\"http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2withchangenotice.pdf\">published in 2002<\/a>. That family (SHA-256, SHA-384, and SHA-512) is widely available in most security products. Not stopping there, the SHA-3 family was also <a href=\"http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/sha-3_standardization.html\">published in 2015<\/a>.<\/p>\n<p>SHA-3 isn\u2019t a direct replacement for SHA-2 but more of an insurance policy against a new attack vector being discovered.<\/p>\n<p>Given the high cost of the attack, what does this week\u2019s announcement really mean?<\/p>\n<h2>Strong Signal<\/h2>\n<p>This announcement is a reminder that the foundations of digital security aren\u2019t timeless. They need to be updated and reviewed on a regular basis, with hashing algorithms, that\u2019s built in the standards process.<\/p>\n<p>The challenge here is in the infrastructure and tools that rely on SHA-1. Just because there\u2019s a new standard available doesn\u2019t mean it has been implemented. If teams aren\u2019t paying attention and updating their code, issues could arise.<\/p>\n<p>Even with all the coverage around this announcement, I haven\u2019t seen any direct issues that users would have to worry about. The most common issue cited is that <a href=\"https:\/\/en.wikipedia.org\/wiki\/Git\">git<\/a> (an extremely popular source control tool) relies on SHA-1 hashes for each commit.<\/p>\n<p>As Linus Torvalds (the original author of the tool) <a href=\"http:\/\/marc.info\/?l=git&amp;m=148787047422954\">points out<\/a>, there isn\u2019t much of a chance of this attack being successful against a git repository. This is a great example of applying context and perspective to a vulnerability.<\/p>\n<p>Despite this, the git project\u2014and others\u2014should have moved away from SHA-1 already. For projects that haven\u2019t, planning a migration should be at the top of their to-do list. The cost to run the attack is only going to drop making it more likely that someone will exploit it for nefarious purposes.<\/p>\n<h2>Next Steps<\/h2>\n<p>For computer scientists, mathematicians, and cryptographers, the details of this announcement are really interesting. For the rest of us, it\u2019s a reminder that we need to regularly review and update our technologies.<\/p>\n<p>Technology innovates at a furious paces. Computing capacity has never been cheaper. There\u2019s a massive upside for the industry and our communities. The downside? We need to ensure that we regularly review and update the foundations of digital security.<\/p>\n<p>What do you think about the SHA-1 announcement? Let me know on Twitter where <a href=\"https:\/\/twitter.com\/marknca\">I\u2019m @marknca<\/a> or in the comments.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/sha-1-9223372036854775808-reasons-not-worry\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 24 Feb 2017 20:52:12 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-300x169.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-300x169.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-768x432.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-1024x576.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-640x360.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-900x506.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-440x248.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367-380x214.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock-160542367.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The SHA-1 hash function is broken. This isn\u2019t news. What is news is that a practical attack has been demonstrated\u00a0 Keep in mind that \u201cpractical\u201d is used in cryptographers terms and those terms don\u2019t necessarily have an impact on your daily IT use. The news has been making the rounds as IT teams, journalists, and&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,11063,10439],"class_list":["post-6780","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-data-privacy","tag-encryption"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6780"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6780\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6780"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}