yitit
Home
/
Computing
/
Research paper provides evidence of first known SHA-1 collision
Research paper provides evidence of first known SHA-1 collision-February 2024
Feb 11, 2026 11:44 PM

  Image used with permission by copyright holderSHA-1 is a cryptographic hash function that underpins various security applications and protocols to help keep the internet safe. Experts, however, have warned for years that it’s out of date. Now, evidence of the first known “collision” of two files with the same SHA-1 hash has demonstrated that the function is no longer safe to use.

  A collision refers to an event where two separate files or messages produce the same cryptographic hash, which malicious entities can use to feign authentication and facilitate an attack. While this has been observed before in relation to other hash algorithms, this is the first time that two SHA-1 hashes have collided, according to a report from Ars Technica.

  Recommended Videos

  SHA1 was officially deprecated by the National Institute of Standards and Technology in 2011, but the algorithm is still in use despite doubts about its security. In November 2016, Microsoft joined Google and Mozilla in making preparations to start blocking sites that use SHA-1 protection.

  Related

  The M1 has a major security loophole that Apple can’t patch Sony’s first drone, the Airpeak S1, rockets to 55 mph in just 3.5 seconds Apple already released the first public beta of iOS 13.1

  A paper that was published Thursday demonstrates that SHA-1 is unsafe as of right now, and should be retired immediately. The paper is the result of two years of collaborative work undertaken by the Centrum Wiskunde & Informatica, a national research center in Amsterdam, and Google’s security, privacy, and anti-abuse research group.

  It would take a great deal of computing power to carry out an attack that takes advantage of an SHA-1 collision — however, that kind of muscle is ready available, as long as the perpetrators have enough financial backing. The paper states that an attack could be performed using Amazon Web Services for as little as $110,000.

  Google’s disclosure policy dictates that source code used to perform the collision detailed in the paper will be released in 90 days. As a result, the sites and services that still use SHA-1 hashing will need to discontinue their usage of the algorithm before that date, as those materials will make it much easier for an attack to be carried out.

Comments
Welcome to yitit comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Login to display more comments
Computing
Recent News
Copyright 2023-2026 - www.yitit.com All Rights Reserved