IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: SHA1 weaknesses...
In article <20050331061843.GA44424%morwong.ucc.gu.uwa.edu.au@localhost> you write:
>On Thu, Mar 31, 2005 at 03:09:18PM +1200, Peter Gutmann wrote:
>> Joseph Galbraith <galb-list%vandyke.com@localhost> writes:
>>
>> >In light of recent SHA1 weaknesses, which, if I understand correctly,
>> >may not really effect SSH, but are still worrisome, should we be
>> >looking at introducing a document for using SHA256?
>> >
>> It doesn't affect its use in either PRFs or HMAC, so SSH is unaffected
>> (I've been working on an article for IEEE S&P for this, but it'll
>> probably be awhile before it appears). There's no need to rush out and
>> change anything because of this, better to wait until we know whether
>> SHA-2 or Whirlpool is the way to go.
>
>Wouldn't lack of collision resistance in SHA1 leave a
>vulnerability with using fingerprints of host public keys
>for verification? (mentioned in the -architecture draft).
No. A collision attack might allow an attacker to make two different keys
that have the same fingerprint, but it wouldn't allow them to make a single
key that has the same fingerprint as some other existing key.
--
Ben Harris
Home |
Main Index |
Thread Index |
Old Index