MD5 Weakness Exploited
The end of 2008 brought a mixed blessing, in the form of a practical way to exploit the cryptographical vulnerability of MD5. A team composed of Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik and Benne de Weger announced that the day predicted by Kaminsky had come – they had succeeded in the creation of a rogue Certification Authority certificate, which can in turn be used to make websites siged with it appear as if they have been verified by a certification authority, such as Verisign’s RapidSSL.
Such a certificate enables man-in-the-middle attacks on HTTPS or, in other words, un-detectable tampering and monitoring of HTTPS connections to sites using vulnerable certificates (those created with the help of) MD5.
It can be argued (and in fact Sotirov and co. do argue) that all MD5-based certificates should be revoked or rather, should have been revoked in 2007, when the attack first became possible due to yet another mathematical breakthrough, which made the creation of MD5 collisions not only possible, but also relatively fast.
Sotirov’s team managed to produce a collision a day using “just” 200 PlayStation3s and one huge server and those are the kind of computing resources which might come easily within the reach of a bot herder. The technical know-how would not, however – the team estimated that their efforts could be duplicated in a month by skilled researchers, or much more by people new to the field.
However, it is highly probable that old, vulnerable certificates will not, in fact, be revoked. However, if everyone stops generating new vulnerable ones, the issue will, for most practical purposes, end. That this is not the case already tells much about how practicality can trump security even in the context of companies which are supposed to provide security as a core business – certification authorities.
We leave you to an excerpt from the exploit site which is kind of a
“Question: What is the best way to ensure that the attack scenario we developed is not possible in the future? Answer: Stop using MD5 as soon as possible, and migrate to more secure cryptographic hash functions”
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US
July 16, 2021
How to protect yourself against cyberstalking
July 06, 2021
The Top Five Security Risks Smartphone Users Face Today
July 02, 2021
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials
July 02, 2021
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger
June 30, 2021
Mobile security threats: reality or myth?
June 13, 2021
FOLLOW US ON
You might also like
April 22, 2021
April 22, 2021
April 13, 2021