Malicious SHA-1

avast! Protection

Level 2
Thread author
Verified
Jun 27, 2014
51
TL;DR: If the four 32-bit constants of SHA-1 can be modified, then exploitable collisions can be constructed. No need to panic, this doesn’t affect the original SHA-1. However, vendors and customers of products with custom cryptography will be interested.

The security of the SHA-1 hashing standard can be fully compromised if one slightly tweaks some of the predefined constants in the SHA-1 algorithm. That is, we show that systems using “custom” versions of SHA-1 may include backdoors exploitable by the designers. Such custom versions of cryptographic standards are typically found in proprietary systems as a way to personalize the cryptography for a given customer, while retaining the security guarantees of the original algorithm.

The colliding messages constructed can be valid archives files (RAR or 7zip) such that the content of the two archives can be fully controlled. We also build colliding JPEG files, which can be any two images, as in the example below (images were chosen at random):

collision.png


We can also construct colliding executables, with MBR (Master Boot Record) or COM files including arbitrary code. Furthermore, we present polyglot malicious SHA-1 instances, that is, for which the designer can create colliding files of different types with arbitrary content (for example: any two MBR’s, any two RAR archives, and any two shell scripts)

Read more: Malicious SHA-1 project

I know that the SHA-1 has spread a lot the last few years. How do you think this will impact the users, developers and malware writers?

Please delete the thread if it was posted before. :)
 

Dubseven

Level 14
Verified
Aug 12, 2013
694
But is better than sha-1, in that thing, at least thats what i think. For me sha-1 is good for encrypting.

Not a very big difference but yes it's a bit better but for a antivirus product you must use others than MD5 etc. , try PE ;)
Also the MD5 you can find two file with the same MD5 (rare but exist) but one malicious other safe.
 

Dani Santos

From Xvirus
Verified
Top Poster
Developer
Well-known
Jun 3, 2014
1,142
Not a very big difference but yes it's a bit better but for a antivirus product you must use others than MD5 etc. , try PE ;)
Also the MD5 you can find two file with the same MD5 (rare but exist) but one malicious other safe.
I was planing in change. I looked at pe, but i still have to learn more about it.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top