經過二年的合作努力, Google 和阿姆斯特丹的 CWI (荷蘭國家數學和計算機科學研究所) 宣佈: 正式在實務上破解了 SHA-1, 並且發表了概念驗證的碰撞, 這表示, 大家應該儘早轉移至較安全的 SHA-256 啦.
hash 函式可以把較大的資料壓縮成較小的訊息摘要,因此在資訊安全上有廣泛的應用。
做為一個密碼學上安全的 hash 函式,其基本要求是:欲找到二個不同的資料其訊息摘要是相同的,在計算上,是不可行的(即計算上安全);如果可以找到,那我們就說此 hash 函數發生了碰撞(collision)。在實務上能被計算出發生碰撞的 hash 函數,就不值得信賴,已沒有安全性可言。
Google 和 CWI 此一研究,可謂驚天之舉,SHA-1 歷經 20 年的生命期,到此,算是終止了。
當然,Google 和 CWI 動用的運算資源,也是非常可觀的:
- 歷經 9,223,372,036,854,775,808 次的 SHA1 計算。
- 攻擊的第一階段,使用了 6,500 個 CPU 計算年。
- 攻擊的第二階段,使用了 110 個 GPU計算年。
平民百姓的我們,望塵莫及。
可以預見,不久的將來,誰掌握了計算資源,誰就掌握了關鍵影響力。
https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html
Announcing the first SHA1 collision
Cryptographic hash functions like SHA-1 are a cryptographer’s swiss army knife. You’ll find that hashes play a role in browser security, managing code repositories, or even just detecting duplicate files in storage. Hash functions compress large amounts of data into a small message digest. As a cryptographic requirement for wide-spread use, finding two messages that lead to the same digest should be computationally infeasible. Over time however, this requirement can fail due to attacks on the mathematical underpinnings of hash functions or to increases in computational power.Today, more than 20 years after of SHA-1 was first introduced, we are announcing the first practical technique for generating a collision. This represents the culmination of two years of research that sprung from a collaboration between the CWI Institute in Amsterdam and Google. We’ve summarized how we went about generating a collision below. As a proof of the attack, we are releasing two PDFs that have identical SHA-1 hashes but different content.For the tech community, our findings emphasize the necessity of sunsetting SHA-1 usage. Google has advocated the deprecation of SHA-1 for many years, particularly when it comes to signing TLS certificates. As early as 2014, the Chrome team announced that they would gradually phase out using SHA-1. We hope our practical attack on SHA-1 will cement that the protocol should no longer be considered secure.We hope that our practical attack against SHA-1 will finally convince the industry that it is urgent to move to safer alternatives such as SHA-256.What is a cryptographic hash collision?
A collision occurs when two distinct pieces of data—a document, a binary, or a website’s certificate—hash to the same digest as shown above. In practice, collisions should never occur for secure hash functions. However if the hash algorithm has some flaws, as SHA-1 does, a well-funded attacker can craft a collision. The attacker could then use this collision to deceive systems that rely on hashes into accepting a malicious file in place of its benign counterpart. For example, two insurance contracts with drastically different terms.
Finding the SHA-1 collision
In 2013, Marc Stevens published a paper that outlined a theoretical approach to create a SHA-1 collision. We started by creating a PDF prefix specifically crafted to allow us to generate two documents with arbitrary distinct visual contents, but that would hash to the same SHA-1 digest. In building this theoretical attack in practice we had to overcome some new challenges. We then leveraged Google’s technical expertise and cloud infrastructure to compute the collision which is one of the largest computations ever completed.
Here are some numbers that give a sense of how large scale this computation was:
- Nine quintillion (9,223,372,036,854,775,808) SHA1 computations in total
- 6,500 years of CPU computation to complete the attack first phase
- 110 years of GPU computation to complete the second phase