The paper described how two separate documents could be manipulated to deliver the same SHA-1 hash with a computation of lower complexity level than previously believed possible.
It is a key technical underpinning of Secure Sockets Layer, a private-key technology used broadly to send secure information such as credit card numbers over the Internet. In addition, a handful of chipmakers—including Atmel, Infineon, National Semiconductor and STMicroelectronics– use SHA-1 as the basis for so-called Trusted Platform Modules (TPMs) at the heart of an industry effort to provide a hardware root of trust in PCs and other devices.
Shamir and others said they believe the work of the Chinese trio will probably be proven to be correct based on their academic reputations, although details of the paper are still under review.
It’s extremely important to develop new kinds of hashing algorithms,” said Shamir in the panel session at RSA. “This break of SHA-1 is stunning,” said Ronald Rivest, a professor at MIT who co-developed the RSA algorithm with Shamir.
“This is another reminder that conservatism is needed in the choice of an algorithm,” added Rivest at the panel session.
“They are going to go nuts,” said a technical advisor to the American Bar Association, trying to assess the legal implications of the news.
http://www.eetimes.com/article/printableArticle.jhtml;jsessionid=KXLBKKQ2JSDYIQSNDBCSKHSCJUMEKJVN?articleID=60401254&url_prefix=&sub_taxonomyID=4217