9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
From: Karl Magdsick <kmagnum@gmail.com>
To: Bruce Ellis <bruce.ellis@gmail.com>,
	Fans of the OS Plan 9 from Bell Labs <9fans@cse.psu.edu>
Subject: Re: [9fans] Venti security in view of SHA-1 exploit
Date: Sat, 19 Feb 2005 22:53:23 -0500	[thread overview]
Message-ID: <cd8ecdef05021919534dabce04@mail.gmail.com> (raw)
In-Reply-To: <775b8d19050219152164c1e976@mail.gmail.com>

Note that the work factor is 2**69, being compared to 2**80 (birthday
attack).  In other words, SHA-1 is still believed to be weakly
collision resistant.  In other words, it still takes an attacker on
the order of 2**160 operations to find a collision between two blocks
if one of the blocks is pre-determined.

Strong collision resistance implies weak collision resistance and
you'd prefer a strongly collision resistant hash function.  A
demonstration that SHA-1 is not strongly collision resistant means
researchers are closer to demonstrating that SHA-1 is not weakly
collision resistant.  However, for fossil, you only need weak
collision resistance for most applications.

If you're worried about an attacker being able to create one file and
give it to you and being able to corrupt it later, then worry.

This attack does not seem to have direct implications for most
applications of fossil.

The sky isn't falling.  You'll probably want to start thinking about
changing hash functions once other hash functions start getting more
scrutiny as researchers start debating SHA-1 replacements.  The SHA-2
family (SHA-224,SHA-256,SHA-384, and SHA-512) have structure similar
to eachother, but perhaps different enough from SHA-1 to not be
vulnerable.  In any case, it would be brash to change hash functions
any time soon.


-Karl


On Sun, 20 Feb 2005 10:21:16 +1100, Bruce Ellis <bruce.ellis@gmail.com> wrote:
> from slashdot
>
> "Using a modified DES Cracker, for the small sum of up to $38M, SHA-1
> can be broken in 56 hours, with current computing power."
>
> so there you go.
>
> brucee
>


  parent reply	other threads:[~2005-02-20  3:53 UTC|newest]

Thread overview: 25+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-02-19 18:37 [9fans] Drawterm and security Brian L. Stuart
2005-02-19 18:48 ` andrey mirtchovski
2005-02-19 21:00   ` Brian L. Stuart
2005-02-19 18:58 ` Russ Cox
2005-02-19 19:15   ` blstuart
2005-02-19 19:20     ` Russ Cox
2005-02-19 20:24       ` blstuart
2005-02-19 20:34         ` andrey mirtchovski
2005-02-19 19:20   ` [9fans] Venti security in view of SHA-1 exploit Paul Lalonde
2005-02-19 19:26     ` andrey mirtchovski
2005-02-19 19:35       ` Paul Lalonde
2005-02-19 20:14         ` Tim Newsham
2005-02-20  4:24           ` Karl Magdsick
2005-02-19 20:15     ` Russ Cox
2005-02-19 22:25       ` boyd, rounin
2005-02-19 22:44         ` [9fans] Venti security in view of SHA-1 exploity William Josephson
2005-02-19 22:48           ` boyd, rounin
2005-02-20 18:08             ` William Josephson
2005-02-19 23:21         ` [9fans] Venti security in view of SHA-1 exploit Bruce Ellis
2005-02-20  1:00           ` Tim Newsham
2005-02-20  3:53           ` Karl Magdsick [this message]
2005-02-19 19:52 ` [9fans] Drawterm and security Skip Tavakkolian
2005-02-19 19:11   ` blstuart
2005-02-21 11:30   ` Robert Raschke
2005-02-21 19:20     ` geoff

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cd8ecdef05021919534dabce04@mail.gmail.com \
    --to=kmagnum@gmail.com \
    --cc=9fans@cse.psu.edu \
    --cc=bruce.ellis@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).