Researchers in China are reported to have identified a
flaw the MD5 hash algorithm which is one of the standard algorithms approved by
the Information Technology Act 2000 for the purpose of Digital Signatures in
India.
Four Chinese authors (Wang, Feng, Lai, and Yu) reported in
their paper in the Crpto 2004 conference held recently (August 15-19) at Santa
Barbara, California that two documents with same MD5 hash can exist and
provided the mathematical means to identify such "collisons."
Another presenter Mr Eli Biham announced new results in
cryptanalyzing SHA-1, including a collision in a reduced-round version of SHA-1.
The full SHA-1 algorithm does 80 rounds of scrambling. At present, Biham and
Chen are reportedly capable of breaking versions of SHA-1 that use up to about
40 rounds, and they seem confident that their attacks can be extended to more
rounds.
Experts have expressed the opinion that "MD5 is fatally
wounded; its use will be phased out. SHA-1 is still alive but the vultures are
circling. A gradual transition away from SHA-1 will now start."
The implications of the research are that the confidence in
the MD5 hash will be seriously eroded. This could lead to a serious problem in
India where MD5 is one of the approved algorithms for the Digital Signatures.
It is however necessary to appreciate that any algorithm will
be subjected to research analysis and in due course could be broken. Though
research of the above kind can throw up "Collision Possibilities", these are
basically theoretical predictions to say that some thing is probable. However
for two working documents to have a similar hash by accident or designing a
modified document that resembles the original in content (With fraudulent
modifications) and also having the same hash value is not a possibility that can
be accepted as real. This is the same argument as to say that the finger prints
of two individuals in several billion people may resemble.
Hence there is no need for unnecessary panic and false
alarms. At the same time it may be said that the research underscores the need
for continuous research and improvement in the algorithms as also finding of new
algorithms.
Naavi
August 25 2004
Related Articles:
MD 5 Flaw Paper
Report from Crypto 2004