Cryptographers Find New Weaknesses in Common Security Algorithms
More fodder for the computer security paranoid: Computer scientists have reported previously unknown flaws in three key mathematical functions embedded in common security applications at this week’s Crypto 2004 conference in Santa Barbara, CA.
Both Chinese and French researchers reported weaknesses in a popular algorithm called MD5, often used with digital signatures. Then Eli Biham of the Technion Institute in Israel reported some early work toward identifying vulnerabilities in the SHA-1 “Secure Hash Algorithm,” which was believed to be secure. The news was reported here on CNET News.
While the results are all preliminary, intruders could eventually use them to insert “back doors” into computer code or to forge electronic signatures.
(Simson Garfinkel recently wrote a nice explanation of hash functions in a column titled “Fingerprint Your Files.”)
The SHA-1 algorithm is currently considered the gold standard hash algorithms and is embedded in popular security programs like PGP (used to encrypt e-mail) and SSL (used to secure Web transactions). The National Institute of Standards and Technology has certified it, and it’s the only signing algorithm approved for use in the U.S. government’s Digital Signature Standard.
Seems like it’s time for mathematicians and computer scientists to start working on the next-next generation of security algorithms.
Keep Reading
Most Popular
Large language models can do jaw-dropping things. But nobody knows exactly why.
And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.
The problem with plug-in hybrids? Their drivers.
Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.
How scientists traced a mysterious covid case back to six toilets
When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.
Google DeepMind’s new generative model makes Super Mario–like games from scratch
Genie learns how to control games by watching hours and hours of video. It could help train next-gen robots too.
Stay connected
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.