• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

By Abhishek Ghosh March 6, 2017 7:21 am Updated on March 6, 2017

Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

Advertisement

Around 2 years back we talk about how to upgrade to SHA-256 and ECC SSL (ECDSA) certificate for the TLS/SSL certificate users. Secure Hash Algorithm 1 is a Cryptographic hashing function. Secure Hash Algorithm 1 (SHA-1) is Circumvented by Google Research For Testing Vulnerability. Some researchers theorised vulnerabilities of SHA-1 from 2005 and now have been exploited for the first time with an unusual technique.

Secure Hash Algorithm 1 SHA-1 Circumvented by Google

 

The Story Behind Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

 

SHA-1 hash algorithm is present for about twenty years. It was designed in 1995 by the National Security Agency (NSA) and has repeatedly audited by the security experts since 2005 for having several theoretical vulnerability in its code. The flaws highlighted in 2011 by the analysts to put the official announcement of SHA-1 to death, but despite that fact, this fact, SHA-1 hash algorithm is still widely used.

The Google security researchers is about to publish a detailed report on the first collision attack which successfully executed the algorithm to face damage. What is it exactly? Google team has had success instead of discovering the first practical method of generating a collision.

Advertisement

---

The researchers were able to create an illegitimate file that has the same SHA-1 hash compared to the legitimate file by collision attack. The flaw of the potential are obvious – to deceive any system by presenting a malicious file as authorised would open new scenarios attacks on the Web.

It is now practical for SHA-1 not to use for the digital signatures, file integrity, and file identification purposes. Everyone Should migrated to safe standards before real-world attacks happens. With time, better and faster computational power will be cheaper and attackers will have the uncanny ability in exploiting vulnerabilities than common expectations.

The resources needed for SHA-1 collision attack is/are not available to everyone. The researchers expect that the release of the paper accelerates the migration from SHA-1 to more secure solutions such as SHA-256 and SHA-3. Attack against SHA-1 will finally convince the industry to take it as an urgent move to safer alternatives like SHA-256. Within 90 days SHA-1 will be easy to circumvent by anyone to have adequate computing resources and experience to launch the attack. Some opined that not only Google, but also other Governmental agencies have systems and personnel to break it.

Tagged With paperuri:(c49dec674355ea7b2c2b230efda77849)

This Article Has Been Shared 970 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

  • Moving to Cloud : Is It Safe For Your Business ?

    Moving to Cloud is not simple outsourcing. It means the possibility for the companies to use online applications in all areas, needs careful analysis to adapt.

  • Cloud Computing : Why Almost Everything is Changing

    Cloud Computing has been a phrase that is known to almost all people who regularly surfs the Internet. It is happening due a big fact – shift of infrastructure.

  • Security in Virtualization

    Security in Virtualization is important now but few years ago none thought, how this would become a complex technology and will require approach to security.

  • Cloud Computing : Your Concerns and Thoughts of Richard Stallman

    Cloud Computing as terminology raises the eyebrows of some users who are associated with academics and computing for many years. Let us discuss on the topic.

  • Artistic Photography and Social Networking

    Artistic Photography is where photography is used as a mean of artistic expression or to achieve enlightenment, social commentary or other ideological themes.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is an Automatic Ethanol Fireplace February 8, 2023
  • Disadvantages of Cloud-Native Computing February 7, 2023
  • Projector Screen Basics February 6, 2023
  • What is Configuration Management February 5, 2023
  • What is ChatGPT? February 3, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Secure Hash Algorithm 1 (SHA-1) Circumvented by Google," in The Customize Windows, March 6, 2017, February 8, 2023, https://thecustomizewindows.com/2017/03/secure-hash-algorithm-1-sha-1-circumvented-by-google/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT