Google just cracked one of the building blocks of web encryption (but don’t worry) (2024)

Today, Google made major waves in the cryptography world, announcing a public collision in the SHA-1 algorithm. It’s a deathblow to what was once one of the most popular algorithms in cryptography, and a crisis for anyone still using the function. The good news is, almost no one is still using SHA-1, so you don’t need to rush out and install any patches. But today’s announcement is still a major power play from Google, with real implications for web security overall.

Like most cryptography, it can get a little complicated, so it’s probably best to start from the very beginning...

What just happened?

Google publicly broke one of the major algorithms in web encryption, called SHA-1. The company’s researchers showed that with enough computing power — roughly 110 years of computing from a single GPU for just one of the phases — you can produce a collision, effectively breaking the algorithm. We’ve known this was possible for a while, but nobody has done it, in part because of the possible fallout.

In accordance with its disclosure policy, Google is waiting 90 days to say exactly how they did it — but once the proof-of-concept is out, anyone with enough computing power will be able to produce a SHA-1 collision, rendering the algorithm both insecure and obsolete.

It’s hard to say if Google’s researchers are the first people to do this (<cough> NSA <cough>), but they’re the first ones to talk about it, which has major implications for anyone still using SHA-1.

What does SHA-1 actually do?

SHA-1 is a hashing function, which produces a digital fingerprint from a given file. That lets you verify a file’s integrity without exposing the entire file, simply by checking the hash. If the hash function is working properly, each file will produce a unique hash — so if the hashes match, the files themselves will also match. That’s particularly important for login systems, which need to verify that a password is correct without exposing the password itself.

What’s a collision and why does it matter?

A collision is what happens when a hashing function breaks, and two files produce the same hash. That could allow an attacker to smuggle in a malicious file because it shares its hash with a legitimate file. As proof-of-concept for today’s announcement, Google published two PDF files that, run through SHA-1, produce the same hash.

In practical terms, a broken hash function could be used to break HTTPS, the encryption system that now protects more than half the web. You can learn more about that system from the podcast below (there’s a whole pie-ribbon-curse metaphor; it’s great), but the gist is that it guarantees that the content you see at Wikipedia.com is really coming from Wikipedia and hasn’t been tampered with along the way. If that system breaks, it would be easy for criminals to insert malware into web traffic from a compromised ISP or other network provider.

Should I be worried?

Unless you make a habit of clicking through those scary red screens, you’ll be fine. Cryptographers have been predicting a collision like this for years, making ever more specific predictions about how you’d produce one and how much computing power it would take. This is the first time anyone’s burned the server time to actually do it, but we’ve known something like this was possible for a while.

As a result, most sites have already dropped SHA-1. As recently as 2014 it was being used for as much as 90 percent of the encryption on the web, but it’s been mostly abandoned in the years since. As of January 1st, every major browser will show you a big red warning when you visit a site secured by SHA-1. It’s hard to say how many of those sites are left, but anyone with a halfway decent certificate provider is already safe.

SHA-1 is still used in a couple places outside web encryption — particularly Git repositories — but given how long the algorithm has been deprecated, the broader impact shouldn’t be that widespread.

Why did Google do this?

The short version is, they wanted to win the argument. Dropping SHA-1 took a lot of time and effort across the industry, and not everyone was eager to do it. The result has been a running fight over how fast make the switch — with Google’s Chrome Security Team providing one of the loudest voices for a faster transition. Chrome was forcing websites away from SHA-1 as early as 2014, long before other browsers started cracking down. Firefox caught on fairly quickly, too, with Microsoft’s Edge and IE bringing up the rear.

This is a fight about how secure the web needs to be

Chrome’s early moves caused a lot of grief among certificate providers — but now that there’s a proof-of-concept collision out there, the Chrome Security Team looks pretty smart. If we’d listened to the slowpokes, this collision could have been a major problem! Instead, the industry moved fast, everyone’s safe, and we have to write blog posts to explain why it matters at all.

In a broader sense, this is a fight about how secure the web needs to be. If you’re making smartphones or selling apps, you might not think it’s worth it to force the entire web off of a shaky algorithm. What does it matter if a few janky websites are slow to make the switch? But Google still a web advertising company, and that means any breakdown in web security is an existential threat. Whenever an algorithm like SHA-1 breaks, ad networks are among the first to be targeted, so Google’s heavily invested in making sure those encryption systems work. And since Google’s ads are served across the entire web, they need to make sure everyone’s on board. Sometimes that means cracking a few heads!

So while it might seem like a mathematical curiosity, this is really a victory lap for Google — and one that cost quite a bit of server time. People have been saying SHA-1 was shaky for years, and now we all know they were right. Luckily, we all listened to the crypto folks, and nothing too serious got broken. You’re welcome.

Google just cracked one of the building blocks of web encryption (but don’t worry) (2024)
Top Articles
Governance: Data sharing frameworks - Global Data Barometer Handbook
Can I Take My House off the Market and Not Regret It?
Boggle Brain Busters Bonus Answers
Apply A Mudpack Crossword
Violent Night Showtimes Near Amc Fashion Valley 18
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Luciipurrrr_
Alaska Bücher in der richtigen Reihenfolge
The Weather Channel Facebook
Aces Fmc Charting
Oro probablemente a duna Playa e nomber Oranjestad un 200 aña pasa, pero Playa su historia ta bay hopi mas aña atras
Echo & the Bunnymen - Lips Like Sugar Lyrics
Lax Arrivals Volaris
Dit is hoe de 130 nieuwe dubbele -deckers -treinen voor het land eruit zien
Wilmot Science Training Program for Deaf High School Students Expands Across the U.S.
Wisconsin Women's Volleyball Team Leaked Pictures
Khiara Keating: Manchester City and England goalkeeper convinced WSL silverware is on the horizon
Der Megatrend Urbanisierung
Violent Night Showtimes Near Amc Fashion Valley 18
Missed Connections Dayton Ohio
All Obituaries | Buie's Funeral Home | Raeford NC funeral home and cremation
Abby's Caribbean Cafe
Beryl forecast to become an 'extremely dangerous' Category 4 hurricane
Accident On The 210 Freeway Today
Decosmo Industrial Auctions
eHerkenning (eID) | KPN Zakelijk
Mail.zsthost Change Password
Catherine Christiane Cruz
Paris Immobilier - craigslist
TMO GRC Fortworth TX | T-Mobile Community
Craigslist Scottsdale Arizona Cars
Gridwords Factoring 1 Answers Pdf
Best New England Boarding Schools
Baddies Only .Tv
Sams La Habra Gas Price
Enjoy4Fun Uno
Infinite Campus Parent Portal Hall County
60 X 60 Christmas Tablecloths
Questions answered? Ducks say so in rivalry rout
Samantha Lyne Wikipedia
Fwpd Activity Log
Emily Browning Fansite
Umd Men's Basketball Duluth
John M. Oakey & Son Funeral Home And Crematory Obituaries
Headlining Hip Hopper Crossword Clue
Congruent Triangles Coloring Activity Dinosaur Answer Key
Minecraft: Piglin Trade List (What Can You Get & How)
Coleman Funeral Home Olive Branch Ms Obituaries
Prologistix Ein Number
라이키 유출
Ihop Deliver
Coors Field Seats In The Shade
Latest Posts
Article information

Author: Margart Wisoky

Last Updated:

Views: 5829

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Margart Wisoky

Birthday: 1993-05-13

Address: 2113 Abernathy Knoll, New Tamerafurt, CT 66893-2169

Phone: +25815234346805

Job: Central Developer

Hobby: Machining, Pottery, Rafting, Cosplaying, Jogging, Taekwondo, Scouting

Introduction: My name is Margart Wisoky, I am a gorgeous, shiny, successful, beautiful, adventurous, excited, pleasant person who loves writing and wants to share my knowledge and understanding with you.