Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Google researchers have cracked a key internet security tool

But the tool remains in wide use.

Google Founders Launch Google Transit Tool For NYC
Google Founders Launch Google Transit Tool For NYC
Google co-founders Sergey Brin (l) and Larry Page
Michael Nagle / Getty Images

Google researchers have cracked a key internet security tool, and hope their finding will spur an end to widespread use of the encryption method.

The team announced Thursday that they had succeeded in breaking SHA-1, or Secure Hash Algorithm 1, encryption in a use case involving a pair of PDF documents.

What this means is that a method of internet security that has for years been known to be theoretically vulnerable has now been proven vulnerable. And what that means is there’s now a fire under the butts of entities still using the algorithm to finally update their systems to use something else.

Per its vulnerability disclosure policy, Google plans to release the code they used to break the SHA-1 encryption 90 days from now, at which point attackers will basically have an instruction manual for breaking the algorithm. Anyone still using it will be significantly more vulnerable.

“Moving forward, it’s more urgent than ever for security practitioners to migrate to safer cryptographic hashes,” reads a company blog post about the finding.

SHA-1 may be used to encrypt things like electronic documents (including legal documents), payment transactions, emails and email attachments.

The algorithm “is extremely widely used. We can’t quantify it, but SHA-1 is extremely widely used,” said Google researcher Elie Bursztein, based in Mountain View, explaining that SHA-1 has been used for many years “so a lot of people have legacy systems” that incorporate it.

The research was spearheaded by Marc Stevens, on staff at Netherlands computer science research institute Centrum Wiskunde & Informatica. Stevens said his SHA-1 research, funded by the Dutch government, began in 2009.

Google started working with Stevens in 2015, according to Bursztein. He said the company contributed resources pro bono, including infrastructure for computing, engineering time and expertise.

SHA-1’s usage stems back to as early as 1995, when the internet was just becoming mainstream with consumers, according to Stevens. But the cyber security community “didn’t know it was weak, really weak, until 2005, so there was no clear incentive to use something even stronger.”

Ars Technica, which reported on the finding earlier today, cited popular software development management system Git as a major entity that uses the algorithm.

Any software company that has been around long enough, including Google, will have used SHA-1, according to Bursztein. He said Google’s system for critical security does not rely on the vulnerable algorithm.


This article originally appeared on Recode.net.

More in Technology

Technology
The case for AI realismThe case for AI realism
Technology

AI isn’t going to be the end of the world — no matter what this documentary sometimes argues.

By Shayna Korol
Politics
OpenAI’s oddly socialist, wildly hypocritical new economic agendaOpenAI’s oddly socialist, wildly hypocritical new economic agenda
Politics

The AI company released a set of highly progressive policy ideas. There’s just one small problem.

By Eric Levitz
Future Perfect
Human bodies aren’t ready to travel to Mars. Space medicine can help.Human bodies aren’t ready to travel to Mars. Space medicine can help.
Future Perfect

Protecting astronauts in space — and maybe even Mars — will help transform health on Earth.

By Shayna Korol
Podcasts
The importance of space toilets, explainedThe importance of space toilets, explained
Podcast
Podcasts

Houston, we have a plumbing problem.

By Peter Balonon-Rosen and Sean Rameswaram
Technology
What happened when they installed ChatGPT on a nuclear supercomputerWhat happened when they installed ChatGPT on a nuclear supercomputer
Technology

How they’re using AI at the lab that created the atom bomb.

By Joshua Keating
Future Perfect
Humanity’s return to the moon is a deeply religious missionHumanity’s return to the moon is a deeply religious mission
Future Perfect

Space barons like Jeff Bezos and Elon Musk don’t seem religious. But their quest to colonize outer space is.

By Sigal Samuel