Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

WSJ: Crack in Computer Security Code Raises Red Flag

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU
 
question everything Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-15-05 02:59 PM
Original message
WSJ: Crack in Computer Security Code Raises Red Flag
Crack in Computer Security Code Raises Red Flag

Obscure but Worrying Flaw Compromises 'Fingerprint' Widely Used on Internet

By CHARLES FORELLE
Staff Reporter of THE WALL STREET JOURNAL
March 15, 2005; Page A1

With worries about online security already at a high pitch, the discovery of a crack in a widely used Internet encryption technique has raised another red flag among government agencies and computer-code experts.

The technique, called a "hash function," has been used for years by Web-site operators to scramble online transmissions containing credit-card information, Social Security numbers and other sensitive data. Hash functions are at work, for instance, for most of the millions of transactions that take place on the Internet every day. The system, involving an algorithm, or mathematical formula, was thought to be impenetrable.

But last month, a team of researchers from Shandong University in eastern China began circulating a draft of a paper showing that a key hash function used in state-of-the-art encryption could be less resistant to an attack by hackers than had been thought.

(snip)

Cryptographers say exploiting the flaw for malevolent purposes doesn't seem practical, even using a lot of computer power. Hash functions are also often used in conjunction with other cryptographic techniques, which haven't shown any flaws. But if someone were to exploit the newfound flaw, the most immediate threat would be to applications involving "authentication." A hacker theoretically could set up a dummy Web site that appears to have the security credentials of a trusted, secure site -- and then steal data that is shipped to this site by unsuspecting users.

(snip)

Write to Charles Forelle at charles.forelle@wsj.com

URL for this article:
http://online.wsj.com/article/0,,SB111084838291579428,00.html (paid subscription)


Printer Friendly | Permalink |  | Top
VelvetMonkeyWrench Donating Member (122 posts) Send PM | Profile | Ignore Tue Mar-15-05 03:07 PM
Response to Original message
1. Gone unmentioned is...
...how this might impact all the wireless stuff that's hitting the streets these days.

==envisioning rampant "drive by" hacking==

Printer Friendly | Permalink |  | Top
 
Ezlivin Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-15-05 03:09 PM
Response to Original message
2. As long as they can't hack my iPod
And my toaster. I really needs my toaster.

:)
Printer Friendly | Permalink |  | Top
 
ret5hd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-15-05 03:12 PM
Response to Reply #2
4. when your ipod starts playing country music...
and your toaster starts spitting out lumps of charcoal...

IT WILL BE TOO LATE! Take precautions now!
Printer Friendly | Permalink |  | Top
 
Ezlivin Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-15-05 03:22 PM
Response to Reply #4
6. Country music? Do iPods support that format?
:)

I do not think that Toby Keith could exist on the same hard drive as Corrosion of Conformity or Black Label Society.
Printer Friendly | Permalink |  | Top
 
FreedomAngel82 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-15-05 03:15 PM
Response to Reply #2
5. What I need
is my microwave. ;) I can't live without it or the coffee maker.
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-15-05 03:10 PM
Response to Original message
3. Took them long enough to report it in the WSJ
The algorithm cracked was SHA1, and was done almost a month ago.

Here's a free article about it:
http://www.eetimes.com/showArticle.jhtml?articleID=60402150


For the non-technical, SHA1 is a big part of SSL, used to secure online communications (ie., 'https').


The good news is that you need a significant amount of computing power to crack SHA1. The bad news is that the amount of computing needed to crack it was significantly less than previously believed.

It's something NSA could easily do, but probably not so easily done by hackers in Russia.

Looks like we're going to need a new hashing algorithm, though.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sat May 11th 2024, 06:46 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC