Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

Data security: A problem in search of a mathematical theory

09.02.2006


The need for security in electronic communications is crucial in today’s world. The foundation for providing this security rests on mathematics. In particular, a certain kind of mathematical function called a "hash function" is central in the design of cryptographic systems that protect electronic communications. But recently the most secure hash function in use today was shown to be vulnerable to attack. An article in the upcoming issue of the Notices of the AMS describes these attacks and sends out a call for a new mathematical theory to undergird future communications security systems.



A hash function is an easy-to-compute compression function that takes as input any string of computer bits and distills that string down to a fixed-length output string: Whether the input is an 8-character password or a 100-page document, the hash function outputs a string of a fixed length. An important feature of hash functions is that they must be hard---or at least computationally too expensive---to invert. So, for example, it should be hard, given the hash of a password, to recover the password itself.

One researcher calls hash functions the "duct tape" of cryptography because they are used everywhere for many different purposes: to authenticate messages, to ascertain software integrity, to create one-time passwords, and to support Internet communication protocols. The very ubiquity of hash functions makes any vulnerability found in them a widespread concern.


SHA-1 is a secure hash algorithm (that is, a computer algorithm based on a hash function) that is the government standard and is very widely used; it was developed by the National Security Agency. Other older and even less secure hash algorithms are still in use in many applications. Cryptographers were already concerned about vulnerabilities that had been exposed in those older algorithms. But they were astonished when, at a cryptography meeting in 2005, researchers announced that they had found a way to attack SHA-1 in far fewer steps than was previously known.

For now, SHA-1 is still safe; the method announced by the researchers would take a huge amount of computational time and resources, and it is not clear how this would be carried out. But such attacks always grow more sophisticated, so cryptographers would like to replace SHA-1 as soon as possible. The NSA has a series of hash algorithms, beginning with SHA-256, that are secure; the issue is how to deploy them throughout the infrastructure.

In her Notices article "Find Me a Hash", Susan Landau describes these developments and the nature of the new vulnerability of SHA-1. Her central point is that the mathematical theory of hash functions needs much more development before researchers can come up with more secure hash algorithms for tomorrow’s applications.

Dr. Susan Landau | EurekAlert!
Further information:
http://www.ams.org

More articles from Information Technology:

nachricht New Foldable Drone Flies through Narrow Holes in Rescue Missions
12.12.2018 | Universität Zürich

nachricht NIST's antenna evaluation method could help boost 5G network capacity and cut costs
11.12.2018 | National Institute of Standards and Technology (NIST)

All articles from Information Technology >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: Data use draining your battery? Tiny device to speed up memory while also saving power

The more objects we make "smart," from watches to entire buildings, the greater the need for these devices to store and retrieve massive amounts of data quickly without consuming too much power.

Millions of new memory cells could be part of a computer chip and provide that speed and energy savings, thanks to the discovery of a previously unobserved...

Im Focus: An energy-efficient way to stay warm: Sew high-tech heating patches to your clothes

Personal patches could reduce energy waste in buildings, Rutgers-led study says

What if, instead of turning up the thermostat, you could warm up with high-tech, flexible patches sewn into your clothes - while significantly reducing your...

Im Focus: Lethal combination: Drug cocktail turns off the juice to cancer cells

A widely used diabetes medication combined with an antihypertensive drug specifically inhibits tumor growth – this was discovered by researchers from the University of Basel’s Biozentrum two years ago. In a follow-up study, recently published in “Cell Reports”, the scientists report that this drug cocktail induces cancer cell death by switching off their energy supply.

The widely used anti-diabetes drug metformin not only reduces blood sugar but also has an anti-cancer effect. However, the metformin dose commonly used in the...

Im Focus: New Foldable Drone Flies through Narrow Holes in Rescue Missions

A research team from the University of Zurich has developed a new drone that can retract its propeller arms in flight and make itself small to fit through narrow gaps and holes. This is particularly useful when searching for victims of natural disasters.

Inspecting a damaged building after an earthquake or during a fire is exactly the kind of job that human rescuers would like drones to do for them. A flying...

Im Focus: Topological material switched off and on for the first time

Key advance for future topological transistors

Over the last decade, there has been much excitement about the discovery, recognised by the Nobel Prize in Physics only two years ago, that there are two types...

All Focus news of the innovation-report >>>

Anzeige

Anzeige

VideoLinks
Industry & Economy
Event News

ICTM Conference 2019: Digitization emerges as an engineering trend for turbomachinery construction

12.12.2018 | Event News

New Plastics Economy Investor Forum - Meeting Point for Innovations

10.12.2018 | Event News

EGU 2019 meeting: Media registration now open

06.12.2018 | Event News

 
Latest News

Data use draining your battery? Tiny device to speed up memory while also saving power

14.12.2018 | Power and Electrical Engineering

Tangled magnetic fields power cosmic particle accelerators

14.12.2018 | Physics and Astronomy

In search of missing worlds, Hubble finds a fast evaporating exoplanet

14.12.2018 | Physics and Astronomy

VideoLinks
Science & Research
Overview of more VideoLinks >>>