Security team successfully cracks SSL using 200 PS3's and MD5

Steven M. Bellovin smb at cs.columbia.edu
Sat Jan 3 15:49:04 UTC 2009


On Sat, 03 Jan 2009 09:35:06 -0500
William Warren <hescominsoon at emmanuelcomputerconsulting.com> wrote:

> Everyone seems to be stampeding to SHA-1..yet it was broken in 2005.
> So we trade MD5 for SHA-1?  This makes no sense.
> 
(a) SHA-1 was not broken as badly.  The best attack is, as I recall,
2^63, which is computationally infeasible without special-purpose
hardware.

(b) Per a paper Eric Rescorla and I wrote, there's no usable
alternative, since too many protocols (including TLS) don't negotiate
hash functions before presenting certificates.  In particular, this
means that a web site can't use SHA-256 because (1) most clients won't
support it; and (2) it can't tell which ones do.  (Note that this
argument applies just as much to combinations of hash functions --
anything that *the large majority of today's* browsers don't implement
isn't usable.)

These two points lead us to (c): security is a matter of economics, not
algorithms.  Switching now to something else loses more in connectivity
or customers than you would lose from such an expensive attack.

		--Steve Bellovin, http://www.cs.columbia.edu/~smb




More information about the NANOG mailing list