• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

By Abhishek Ghosh March 6, 2017 7:21 am Updated on March 6, 2017

Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

Advertisement

Around 2 years back we talk about how to upgrade to SHA-256 and ECC SSL (ECDSA) certificate for the TLS/SSL certificate users. Secure Hash Algorithm 1 is a Cryptographic hashing function. Secure Hash Algorithm 1 (SHA-1) is Circumvented by Google Research For Testing Vulnerability. Some researchers theorised vulnerabilities of SHA-1 from 2005 and now have been exploited for the first time with an unusual technique.

Secure Hash Algorithm 1 SHA-1 Circumvented by Google

 

The Story Behind Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

 

SHA-1 hash algorithm is present for about twenty years. It was designed in 1995 by the National Security Agency (NSA) and has repeatedly audited by the security experts since 2005 for having several theoretical vulnerability in its code. The flaws highlighted in 2011 by the analysts to put the official announcement of SHA-1 to death, but despite that fact, this fact, SHA-1 hash algorithm is still widely used.

The Google security researchers is about to publish a detailed report on the first collision attack which successfully executed the algorithm to face damage. What is it exactly? Google team has had success instead of discovering the first practical method of generating a collision.

Advertisement

---

The researchers were able to create an illegitimate file that has the same SHA-1 hash compared to the legitimate file by collision attack. The flaw of the potential are obvious – to deceive any system by presenting a malicious file as authorised would open new scenarios attacks on the Web.

It is now practical for SHA-1 not to use for the digital signatures, file integrity, and file identification purposes. Everyone Should migrated to safe standards before real-world attacks happens. With time, better and faster computational power will be cheaper and attackers will have the uncanny ability in exploiting vulnerabilities than common expectations.

The resources needed for SHA-1 collision attack is/are not available to everyone. The researchers expect that the release of the paper accelerates the migration from SHA-1 to more secure solutions such as SHA-256 and SHA-3. Attack against SHA-1 will finally convince the industry to take it as an urgent move to safer alternatives like SHA-256. Within 90 days SHA-1 will be easy to circumvent by anyone to have adequate computing resources and experience to launch the attack. Some opined that not only Google, but also other Governmental agencies have systems and personnel to break it.

Tagged With paperuri:(c49dec674355ea7b2c2b230efda77849)

This Article Has Been Shared 719 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

  • Moving to Cloud : Is It Safe For Your Business ?

    Moving to Cloud is not simple outsourcing. It means the possibility for the companies to use online applications in all areas, needs careful analysis to adapt.

  • Cloud Computing : Why Almost Everything is Changing

    Cloud Computing has been a phrase that is known to almost all people who regularly surfs the Internet. It is happening due a big fact – shift of infrastructure.

  • Security in Virtualization

    Security in Virtualization is important now but few years ago none thought, how this would become a complex technology and will require approach to security.

  • Cloud Computing : Your Concerns and Thoughts of Richard Stallman

    Cloud Computing as terminology raises the eyebrows of some users who are associated with academics and computing for many years. Let us discuss on the topic.

  • Artistic Photography and Social Networking

    Artistic Photography is where photography is used as a mean of artistic expression or to achieve enlightenment, social commentary or other ideological themes.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (22.1K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • How Artificial Intelligence (AI) Is Changing The Way We Play Bingo May 16, 2022
  • Why You Need A Big Data Consultant May 15, 2022
  • The Connection Between AI And Online Slots May 13, 2022
  • How To Choose Your Niche As An Instagram Influencer May 12, 2022
  • How to Choose a Powerful Domain Name for Your New Venture May 12, 2022

About This Article

Cite this article as: Abhishek Ghosh, "Secure Hash Algorithm 1 (SHA-1) Circumvented by Google," in The Customize Windows, March 6, 2017, May 16, 2022, https://thecustomizewindows.com/2017/03/secure-hash-algorithm-1-sha-1-circumvented-by-google/.

Source:The Customize Windows, JiMA.in

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Privacy Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2022 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy