{"id":7986,"date":"2025-11-20T20:08:52","date_gmt":"2025-11-20T20:08:52","guid":{"rendered":"https:\/\/netpipe.ca\/?p=7986"},"modified":"2025-11-20T20:08:52","modified_gmt":"2025-11-20T20:08:52","slug":"weakness-in-md5-and-sha-1-hashing","status":"publish","type":"post","link":"https:\/\/netpipe.ca\/?p=7986","title":{"rendered":"weakness in md5 and sha-1 hashing"},"content":{"rendered":"<p>The name \u201cMD5\u201d or \u201cSHA-1\u201d is already permanently tainted<\/p>\n<p>Even if someone tried to release:<\/p>\n<p>\u201cMD5-fixed\u201d<\/p>\n<p>\u201cSHA-1+\u201d<\/p>\n<p>\u201cSHA-1.1\u201d<\/p>\n<p>No security professional would trust it.<\/p>\n<p>Once a hash is proven structurally flawed, its brand is dead forever.<\/p>\n<p>\u274c 2. MD5 is broken<\/p>\n<p>MD5 was designed in 1992. By the early 2000s:<\/p>\n<p>Flaws were found in the core compression function.<\/p>\n<p>These allowed researchers to exploit differential cryptanalysis \u2014 studying how small bit changes propagate inside MD5.<\/p>\n<p>The result:<\/p>\n<p>In 2004, collisions were generated in under a minute.<\/p>\n<p>By 2007, attackers could craft chosen-prefix collisions \u2014 meaning they could create two completely different files with the same MD5 hash.<\/p>\n<p>In 2012\u20132013, researchers forged TLS certificates by exploiting MD5 weaknesses.<\/p>\n<p>Why?<\/p>\n<p>Because MD5\u2019s internal mixing steps were mathematically weak and allowed predictable patterns.<\/p>\n<p>\u274c 3. SHA-1 is also broken<\/p>\n<p>SHA-1 (1995) was better than MD5, but shared similar structural vulnerabilities.<\/p>\n<p>In 2017, Google and CWI Amsterdam created the first public SHA-1 collision (\u201cSHAttered\u201d).<\/p>\n<p>It cost about $100k in cloud GPUs \u2014 extremely cheap for a state-level attacker.<\/p>\n<p>The problem again:<\/p>\n<p>SHA-1\u2019s internal design allowed differential attacks that reduce the complexity from the ideal:<\/p>\n<p>Should require:\u20032\u2078\u2070 operations<\/p>\n<p>Actually required: 2\u2076\u00b9 operations (as of best attacks)<\/p>\n<p>That is an astronomically huge difference.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The name \u201cMD5\u201d or \u201cSHA-1\u201d is already permanently tainted Even if someone tried to release: \u201cMD5-fixed\u201d \u201cSHA-1+\u201d \u201cSHA-1.1\u201d No security professional would trust it. Once a hash is proven structurally flawed, its brand is dead forever. \u274c 2. MD5 is broken MD5 was designed in 1992. By the early 2000s: Flaws were found in the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7986","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/netpipe.ca\/index.php?rest_route=\/wp\/v2\/posts\/7986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netpipe.ca\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netpipe.ca\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netpipe.ca\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/netpipe.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7986"}],"version-history":[{"count":1,"href":"https:\/\/netpipe.ca\/index.php?rest_route=\/wp\/v2\/posts\/7986\/revisions"}],"predecessor-version":[{"id":7987,"href":"https:\/\/netpipe.ca\/index.php?rest_route=\/wp\/v2\/posts\/7986\/revisions\/7987"}],"wp:attachment":[{"href":"https:\/\/netpipe.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netpipe.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netpipe.ca\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}