A popular encryption algorithm is being killed because it is too weak

The developers of two open source code libraries for Secure Shell, which is the protocol used by millions of computers to create encrypted connections, have decided to no longer support the Secure Hash Algorithm 1 (SHA-1) due to growing security concerns.

As reported by Ars Technica, developers using the OpenSSH and Libssh libraries will no longer be able to use SHA-1 to digitally sign encryption keys going forward. In its release notes, OpenSSH explained why it will no longer support SHA-1, saying:

“It is now possible to perform chosen-prefix attacks against the SHA-1 algorithm for less than USD$50K. For this reason, we will be disabling the "ssh-rsa" public key signature algorithm by default in a near-future release. This algorithm is unfortunately still used widely despite the existence of better alternatives, being the only remaining public key signature algorithm specified by the original SSH RFCs.”

SHA-1 is a cryptographic hash function that was first developed in 1995. It is used for producing hash “digests” which are each 40 hexadecimal characters long and these digests are meant to be distinct for every message, file and function that uses them.

Hash collisions

A collision is a cryptographic term used to describe when two or more inputs generate the same outputted digest and researchers began warning that SHA-1 was becoming increasingly vulnerable to collisions almost a decade ago.

In 2017, SHA-1 fell victim to a collision attack that cost $110,000 to produce which lead to a number of browsers, browser-trusted certificate authorities and software update systems to abandon the algorithm though some services and software continued using it despite the risk.

However, in January of this year, researchers showed that an even more powerful collision attack could be launched for just $45,000. This chosen-prefix attack showed that it is possible to modify an existing input and still end up with the same SHA-1 hash and an attacker could use this method to alter documents or software to bypass SHA-1-based integrity checks.

While OpenSSH and Libssh will no longer support SHA-1, the encryption algorithm is still supported in recent versions of OpenSSL.

Via Ars Technica

How It works

Search Crack for

Latest IT News

Jul 6
The Chromium team has improved Chrome's real-world battery life by limiting the frequency of JavaScript timers.
Jul 6
Some users are worried about whether they need the Windows 10 patches, with some fixes failing to install anyway.
Jul 6
Bharti Airtel is planning to launch its own videoconferencing app to take on Zoom.
Jul 6
It looks like Microsoft is preparing to drop the 'System' section of the Control Panel in future versions of Windows 10 - which is a shame, as it's pretty useful.
Jul 6
TechRadar Pro has partnered with RemotePC for an exclusive offer of $3.48 for your first year, for 10 computers.
Jul 3
A solution is in the pipeline apparently, but for now there are a couple of workarounds.
Jul 3
Mukesh Ambani's Reliance Jio launches JioMeet video calling platform to take on Zoom.

Latest cracks