• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

By Abhishek Ghosh March 6, 2017 7:21 am Updated on March 6, 2017

Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

Advertisement

Around 2 years back we talk about how to upgrade to SHA-256 and ECC SSL (ECDSA) certificate for the TLS/SSL certificate users. Secure Hash Algorithm 1 is a Cryptographic hashing function. Secure Hash Algorithm 1 (SHA-1) is Circumvented by Google Research For Testing Vulnerability. Some researchers theorised vulnerabilities of SHA-1 from 2005 and now have been exploited for the first time with an unusual technique.

Secure Hash Algorithm 1 SHA-1 Circumvented by Google

 

The Story Behind Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

 

SHA-1 hash algorithm is present for about twenty years. It was designed in 1995 by the National Security Agency (NSA) and has repeatedly audited by the security experts since 2005 for having several theoretical vulnerability in its code. The flaws highlighted in 2011 by the analysts to put the official announcement of SHA-1 to death, but despite that fact, this fact, SHA-1 hash algorithm is still widely used.

The Google security researchers is about to publish a detailed report on the first collision attack which successfully executed the algorithm to face damage. What is it exactly? Google team has had success instead of discovering the first practical method of generating a collision.

Advertisement

---

The researchers were able to create an illegitimate file that has the same SHA-1 hash compared to the legitimate file by collision attack. The flaw of the potential are obvious – to deceive any system by presenting a malicious file as authorised would open new scenarios attacks on the Web.

It is now practical for SHA-1 not to use for the digital signatures, file integrity, and file identification purposes. Everyone Should migrated to safe standards before real-world attacks happens. With time, better and faster computational power will be cheaper and attackers will have the uncanny ability in exploiting vulnerabilities than common expectations.

The resources needed for SHA-1 collision attack is/are not available to everyone. The researchers expect that the release of the paper accelerates the migration from SHA-1 to more secure solutions such as SHA-256 and SHA-3. Attack against SHA-1 will finally convince the industry to take it as an urgent move to safer alternatives like SHA-256. Within 90 days SHA-1 will be easy to circumvent by anyone to have adequate computing resources and experience to launch the attack. Some opined that not only Google, but also other Governmental agencies have systems and personnel to break it.

Tagged With paperuri:(c49dec674355ea7b2c2b230efda77849)
Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

  • What is SHA or Secure Hash Algorithm?

    Secure Hash Algorithm (SHA) refers to a group of standardized cryptologic hash functions is the basis for creating a digital signature.

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • Generate CSR, Private Key With SHA256 Signature

    Here is how to generate CSR, Private Key with SHA256 signature with OpenSSL for either reissue or new request to get SSL/TLS Certificate.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Hybrid Multi-Cloud Environments Are Becoming UbiquitousJuly 12, 2023
  • Data Protection on the InternetJuly 12, 2023
  • Basics of BJT TransistorJuly 11, 2023
  • What is Confidential Computing?July 11, 2023
  • How a MOSFET WorksJuly 10, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy