Share

Related Links

  • Credant
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Related Stories

  • Scotland's Openkast offers new solution to data loss issues
    Openkast, an East Kilbride-based SME technology company, has announced a data loss prevention solution whose core technology is being used in research projects by the UK military, including a possible deployment on UK submarines.
  • Nuclear secrets revealed after unencrypted USB stick found in Cumbria hotel room
    Local media reports in the Lake District have revealed that an unencrypted USB stick – apparently containing details on the Sellafield nuclear site's operations – have been found by a coach driver in a Cumbria hotel room.
  • GCHQ trio honoured for their work on symmetric cryptography
    The cryptography work of three GCHQ workers in the 1970s – a decade before the precursors to today's internet got under way – has been recognised in an awards ceremony carried out this morning.
  • Researchers discover flaw in quantum cryptography
    Norwegian security researchers have claimed they can crack quantum cryptography, which could make the highly secure encryption technique vulnerable to hackers.
  • Comment: Securing data-at-rest with self-encrypting drives
    In order for data centres to guarantee the security of their most valuable asset – that is, data – they must identify critical control points where data is at its most vulnerable. One of these critical control points is when data is at rest, particularly data stored on hardware and storage devices. Bret Weber, chief architect at storage and networking provider LSI, that looks at how data centres can utilise self-encrypting hard drives to protect data-at-rest.

Top 5 Stories

News

SHA-1 crypto protocol cracked using Amazon cloud computing resources

18 November 2010

A German hacker has successfully cracked a six-character implementation of the 160-bit SHA-1 crypto algorithm using a cloud computing resource. The hack was completed in 49 minutes at a cost of just $2.10.

Thomas Roth, a German IT security researcher, says that he used one of Amazon Web Service's cluster GPU instances to crack the passwords encrypted in an SHA-1 hash.

Writing in his Stacksmashing.net blog, Roth said that an instance in the Amazon cloud that provides users with the power of two NVIDIA Tesla Fermi M2050 GPUs, with a specification that includes 22 gigabytes of RAM, 1.69 terabytes of storage and a 64-bit platform to execute the code.

"GPUs are known to be the best hardware accelerator for cracking passwords, so I decided to give it a try: How fast can this instance type be used to crack SHA-1 hashes", he said.

The fact that the crack took all of 49 minutes shows that SHA1 for password hashing is deprecated, he added: "you really don't want to use it anymore."

"Instead, use something like scrypt or PBKDF2! Just imagine a whole cluster of this machines (Which is now easy to do for anybody thanks to Amazon) cracking passwords for you, pretty comfortable", he said.

Commenting on Roth's discovery, Chris Burchett, CTO and co-founder of Credant Technologies, said that the fact that he tapped a pay-as-you-use cloud computing based parallel processing environment is very worrying.

This is, he said, one of the first times that an SHA-1 encrypted password has been cracked using rentable cloud-based computation.

"It's worrying because, as Thomas Roth says, it's easy to start up a 100-node cracking cluster with just a few clicks, but if you extend the parallel processing environment by just a few factors, it becomes possible to crack passwords of most types in a relatively short timeframe", he said.

"Although renting processing time on a cloud resource like Amazon Web Services could get relatively expensive at this level, there is the added dimension of cybercriminals using stolen payment card credentials to fund their cloud cracking escapades, which means they will not be bothered about the cost involved", he added.

Burchett went on to say that the incident has parallels with other online password and hash cracking websites including the revelation of almost 12 months ago when security researcher Moxie Marlinspike revealed he had created an online WiFi password cracking service called, appropriately enough, WPAcracker.com.

As reported by Infosecurity at the time, some experts were calling Marlinspike's service a cloud-based resource, but, says Burchett, whilst the $17.00-a-time service can reportedly crack a WiFi password in around 20 minutes - a process that would take a dual-core PC around 120 hours - it is a highly specific cracking application with relatively finite processing power.

Credant's CTO argues that using Amazon Web Services to crack a 160-bit SHA-1-hashed password extends the hacker ballgame into a whole new cloud computing dimension, since it allows hackers to run custom cracking code that would normally take several months on a multi-core supercomputer – a platform that cybercriminals would not normally have access to/

Roth's exploit, says Burchett, is significant, as up until to now, we've been in the realm of a more limited use crack sites, but the concern is that the practically limitless compute resources for relatively low cost available in the cloud can make attacks that previously were proof of concept an everyday reality.

"You can be sure that cybercriminals will be passing reports of Roth’s exploits on to their black hat hackers and asking them to repeat the methodology in other applications", he said.

"It has to be remembered that SHA-1, although it is being phased out, still forms part of several widely-deployed security applications, including Secure Sockets Layer, Transport Layer Security and S/MIME protocols to mention but a few", he added.

"At the moment, we are talking about a limited application, but it doesn't take a genius to work out the ramifications of Mr Roth's research project."

This article is featured in:
Encryption

 

Comments

abc123 says:

04 September 2013
This article is full of cryptographic misconceptions. Sha1 is cryptographic hash function designed with two main ideas in mind:
1. It should be virtually impossible to find two values that will be produce the hash after application of sha1.
2. It should be fast.
Sha1 is still considered borderline secure, as there have been some theoretical attacks concerning collision resistance (property 1), but nobody was yet able to actually compute a collision (at least publicly). These theoretical attacks are the reason that sha1 is phased out in protocols like "Secure Sockets Layer, Transport Layer Security" (which are the same btw.: TLS supersedes SSL) in favour of Sha256/Sha512 or Sha3.

The attacks found by Thomas Roth are completely different. In fact, if you would just replace Sha1 with Sha3 the passwords could be cracked as easily. The scenario he is talking about is password hashing and there property 2) of sha1 - its speed - is the problem. If it is blazingly fast to hash a password then it is equally fast to test whether a password is right or wrong. Thus if you just try out all likely passwords (and you can test billions per second) you will find the right fast. The alternatives mentioned (scrypt or PBKDF2) will slow down a single password hashing and thus also slow down an attacker.

In a magazine called "infosecurity" I would have expected more skilled authors :(

Note: The majority of comments posted are created by members of the public. The views expressed are theirs and unless specifically stated are not those Elsevier Ltd. We are not responsible for any content posted by members of the public or content of any third party sites that are accessible through this site. Any links to third party websites from this website do not amount to any endorsement of that site by the Elsevier Ltd and any use of that site by you is at your own risk. For further information, please refer to our Terms & Conditions.

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×