furrbear: (FreeBSD Daemon)
[personal profile] furrbear
http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d.pdf
There is not much hard information yet, but the two big quotes are "SHA-1 collisions now 2^52" and "Practical collisions are within resources of a well funded organisation."
Hmm, what to do about all the applications where SHA-1 is hardwired? There's still plenty of MD-5 out there too.

Date: 2009-04-30 11:32 pm (UTC)
From: [identity profile] sultmhoor.livejournal.com
I'm glad I'm not too paranoid using sha-512 with 32 bit salts, lol.

Date: 2009-05-01 01:51 am (UTC)
From: [identity profile] cipherpunk.livejournal.com

… what to do about all the applications where SHA–1 is hardwired? There’s still plenty of MD–5 out there too.

I think the plan these people have is, with a tip o’ the hat to Sluggy, “commence simultaneous panic, on my mark…”

Date: 2009-05-02 04:01 pm (UTC)
From: [identity profile] backrubbear.livejournal.com
IETF is still trying to push sha-1 into the infrastructure in reaction to the ancient "md5 is weak" news. Sounds like it'll get support about the time that it's a bit late.

The nice thing is that most of its uses can live with weak algorithms as long as key rotation is used. But as a counter to that, key rotation happens very seldom. IKE and routing protocols don't coexist very well.

Date: 2009-05-03 12:24 am (UTC)
From: [identity profile] cipherpunk.livejournal.com

The thing which stuns me most about the IETF’s push towards SHA–1 is that they are once again learning almost exactly the wrong lesson from history.

Which algorithms are used is not relevant. Algorithms have a finite life span. The existence of a migration mechanism is enormously relevant, and most protocols don’t have it.

Date: 2009-05-03 12:23 pm (UTC)
From: [identity profile] backrubbear.livejournal.com
That's less of an issue that you may think. Most modern protocols tend to allow a selection field to allow crypto protocols to be applied arbitrarily. The main problem is getting the vendors to *support* them since they have to be usually implemented in hardware.

Profile

furrbear: (Default)
furrbear

May 2013

S M T W T F S
   12 34
567891011
12131415161718
19202122232425
262728293031 

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Mar. 16th, 2026 03:44 pm
Powered by Dreamwidth Studios