Recent developments bring big tech companies closer to Q-Day danger zone



Sometime around 2010, a sophisticated piece of malware called Flame hijacked the mechanism Microsoft uses to distribute updates to millions of Windows computers around the world. According to reports, the malware was jointly developed by the United States and Israel and pushed malicious updates to compromised Iranian government networks.

The key to the “collision” attack is the use of MD5, a cryptographic hash function used by Microsoft to verify digital credentials. By creating a cryptographically perfect digital signature based on MD5, the attacker forged a certificate to authenticate his malicious update server. If this type of attack were more widely exploited, it would have catastrophic consequences around the world.

Uncomfortably close to danger zone

This event includes exposed The year 2012 is now a cautionary tale for cryptography engineers as they contemplate the decline of two key cryptographic algorithms used everywhere. since 2004MD5 is known to be susceptible to “collision,” a fatal flaw that allows an adversary to generate two different inputs that produce the same output.

Read more

Comment



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *