{"id":52300,"date":"2023-06-12T22:23:13","date_gmt":"2023-06-12T14:23:13","guid":{"rendered":"http:\/\/lrxjmw.cn\/?p=52300"},"modified":"2023-06-12T22:23:13","modified_gmt":"2023-06-12T14:23:13","slug":"event-first-hash","status":"publish","type":"post","link":"https:\/\/lrxjmw.cn\/event-first-hash.html","title":{"rendered":"\u817b\u5bb3\uff01\u7b2c\u4e00\u4f8bSHA-1\u54c8\u5e0c\u78b0\u649e\u5b9e\u4f8b"},"content":{"rendered":"\n\n\n
\u5bfc\u8bfb<\/td>\n\u6709\u6d88\u606f\u62a5\u9053\u8377\u5170\u963f\u59c6\u65af\u7279\uff08CWI\uff09\u7814\u7a76\u6240\u548c\u8c37\u6b4c\u7814\u7a76\u4eba\u5458\u53d1\u5e03\u4e86\u4e16\u754c\u4e0a\u7b2c\u4e00\u4f8b\u516c\u5f00\u7684SHA-1\u54c8\u5e0c\u78b0\u649e\u5b9e\u4f8b\u3002\u5728\u73b0\u5b9e\u4e16\u754c\u91cc\uff0c\u54c8\u5e0c\u78b0\u649e\u4e8b\u4ef6\u4e5f\u786e\u6709\u53d1\u751f\u3002\u5982\u5229\u7528 MD5 \u78b0\u649e\u4f2a\u9020\u5408\u6cd5 CA \u8bc1\u4e66\uff0c\u8fdb\u800c\u653b\u51fb HTTPS \u5b89\u5168\u4f53\u7cfb\u3002<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

2017\u5e742\u670823\u65e5\uff0c\u8377\u5170\u963f\u59c6\u65af\u7279\u4e39 Centrum Wiskunde & Informatica (CWI) \u7814\u7a76\u6240\u548c Google \u516c\u53f8\u7684\u7814\u7a76\u4eba\u5458 [Marc Stevens (CWI Amsterdam), Elie Bursztein (Google), Pierre Karpman (CWI Amsterdam), Ange Albertini (Google), Yarik Markov (Google), Alex Petit Bianco (Google), Clement Baisse (Google)] \u5728\u8c37\u6b4c\u5b89\u5168\u535a\u5ba2\u4e0a\u53d1\u5e03\u4e86\u4e16\u754c\u4e0a\u7b2c\u4e00\u4f8b\u516c\u5f00\u7684 SHA-1 \u54c8\u5e0c\u78b0\u649e\u5b9e\u4f8b\uff01\u5728\u7ecf\u8fc7\u4e24\u5e74\u7684\u8054\u5408\u7814\u7a76\u548c\u82b1\u8d39\u4e86\u5de8\u5927\u7684\u8ba1\u7b97\u673a\u65f6\u95f4\u4e4b\u540e\uff0c\u7814\u7a76\u4eba\u5458\u5728\u4ed6\u4eec\u7684\u7814\u7a76\u7f51\u7ad9SHAttered\u4e0a\u7ed9\u51fa\u4e86\u4e24\u4e2a\u5185\u5bb9\u4e0d\u540c\uff0c\u4f46\u662f\u5177\u6709\u76f8\u540c SHA-1 \u6d88\u606f\u6458\u8981\u7684 PDF \u6587\u4ef6\uff0c\u8fd9\u5c31\u610f\u5473\u7740\u5728\u7406\u8bba\u7814\u7a76\u957f\u671f\u4ee5\u6765\u8b66\u793a SHA-1 \u7b97\u6cd5\u5b58\u5728\u98ce\u9669\u4e4b\u540e\uff0cSHA-1 \u7b97\u6cd5\u7684\u5b9e\u9645\u653b\u51fb\u6848\u4f8b\u4e5f\u6d6e\u51fa\u6c34\u9762\uff0c\u540c\u65f6\u4e5f\u6807\u5fd7\u7740 SHA-1 \u7b97\u6cd5\u7ec8\u4e8e\u8d70\u5411\u4e86\u751f\u547d\u7684\u672b\u671f\u3002<\/p>\n

\"\"<\/p>\n

\u76f8\u5173\u80cc\u666f<\/strong><\/div>\n

MD-SHA \u7cfb\u5217 Hash \u51fd\u6570\u5bb6\u65cf\u662f\u6700\u4e3a\u77e5\u540d\u7684 Hash \u51fd\u6570\u5bb6\u65cf\uff0cMD5\uff0cSHA-1 \u548c SHA-2 \u90fd\u88ab\u5e7f\u6cdb\u7684\u4f7f\u7528\u8fc7\u30021990 \u5e74 MD4 \u7b97\u6cd5\u88ab\u63d0\u51fa\uff0c\u4f46\u662f\u88ab\u5f88\u5feb\u53d1\u73b0\u4e86\u4e25\u91cd\u7684\u5b89\u5168\u95ee\u9898\uff0c\u5728 1992 \u5e74\u88ab MD5 \u7b97\u6cd5\u53d6\u4ee3\u3002MD5 \u7b97\u6cd5\u5728\u4e4b\u540e\u7684\u5341\u51e0\u5e74\u5185\u88ab\u8f6f\u4ef6\u884c\u4e1a\u5e7f\u6cdb\u4f7f\u7528\uff0c\u76f4\u5230 2004 \u5e74\u6211\u56fd\u5bc6\u7801\u5b66\u5bb6\u738b\u5c0f\u4e91\u5728\u56fd\u9645\u5bc6\u7801\u8ba8\u8bba\u5e74\u4f1a\uff08CRYPTO\uff09\u4e0a\u5c55\u793a\u4e86 MD5 \u7b97\u6cd5\u7684\u78b0\u649e\u5e76\u7ed9\u51fa\u4e86\u7b2c\u4e00\u4e2a\u5b9e\u4f8b\uff08\u300aCollisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD\uff0crump session of CRYPTO 2004\uff0cHow to Break MD5 and Other Hash Functions\uff0cEuroCrypt 2005\u300b\uff09\u3002\u8be5\u653b\u51fb\u590d\u6742\u5ea6\u5f88\u4f4e\uff0c\u5728\u666e\u901a\u8ba1\u7b97\u673a\u4e0a\u53ea\u9700\u8981\u51e0\u79d2\u949f\u7684\u65f6\u95f4\u3002\u5728 2005 \u5e74\u738b\u5c0f\u4e91\u6559\u6388\u4e0e\u5176\u540c\u4e8b\u53c8\u63d0\u51fa\u4e86\u5bf9 SHA-1 \u7b97\u6cd5\u7684\u78b0\u649e\u7b97\u6cd5\uff08\u300aFinding Collisions in the Full SHA-1\uff0c CRYPTO 2005\u300b\uff09\uff0c\u4e0d\u8fc7\u8ba1\u7b97\u590d\u6742\u5ea6\u4e3a 2 \u7684 69 \u6b21\u65b9\uff0c\u5728\u5b9e\u9645\u60c5\u51b5\u4e0b\u96be\u4ee5\u5b9e\u73b0\u3002<\/p>\n

\u5728\u73b0\u5b9e\u4e16\u754c\u4e2d\uff0c\u5229\u7528 Hash \u78b0\u649e\u7684\u771f\u5b9e\u6848\u4f8b\u786e\u786e\u5b9e\u5b9e\u53d1\u751f\u5728\u6211\u4eec\u8eab\u8fb9\uff1a<\/p>\n

2008\u5e74\u7684Chaos Communication Congress\u5927\u4f1a\u4e0a\uff0c\u7814\u7a76\u4eba\u5458\u5c55\u793a\u4e86\u5229\u7528MD5\u78b0\u649e\u6765\u4f2a\u9020\u5408\u6cd5CA\u8bc1\u4e66\uff0c\u4ece\u800c\u653b\u7834HTTPS\u7684\u5b89\u5168\u4f53\u7cfb\u3002<\/div>\n
\n

2012\u5e74\u5728\u4e2d\u4e1c\u5927\u8303\u56f4\u7206\u53d1\u7684\u706b\u7130\uff08Flame\uff09\u75c5\u6bd2\uff0c\u5305\u542b\u4e86\u4e00\u4e2a\u4f2a\u9020\u7684\u6570\u5b57\u7b7e\u540d\uff0c\u5c31\u662f\u5229\u7528MD5\u78b0\u649e\u4f2a\u9020\u4e86\u5408\u6cd5\u7684\u5fae\u8f6f\u7b7e\u540d\u6765\u9003\u907f\u6740\u6bd2\u8f6f\u4ef6\u7684\u67e5\u6740\u3002<\/p>\n

\u653b\u51fb\u5386\u7a0b<\/strong><\/div>\n

\u672c\u6b21\u653b\u51fb\u7684\u5173\u952e\u5148\u751f\u662f\u8377\u5170\u963f\u59c6\u65af\u7279\u4e39 CWI \u7814\u7a76\u6240\u7684\u00a0Marc Stevens\uff0c\u4ed6\u81ea 2006 \u5e74\u4ee5\u6765\u4e00\u76f4\u5728 Hash \u7b97\u6cd5\u7684\u7814\u7a76\u9886\u57df\u53d1\u8868\u4e86\u5927\u91cf\u4ee4\u4eba\u8273\u7fa1\u7684\u6210\u679c\uff0c\u5305\u62ec\u4e00\u7cfb\u5217\u5173\u4e8e MD5 \u7b97\u6cd5\u7684\u653b\u51fb\u30022009 \u5e74\u4ed6\u4f5c\u4e3a\u4e00\u4f5c\u7684\u8bba\u6587 \u300aShort chosen-prefix collisions for MD5 and the creation of a rogue CA certificate \u300b\u5728\u5f53\u5e74\u7684 CRYPTO \u4e0a\u83b7\u5f97\u4e86\u6700\u4f73\u8bba\u6587\u5956\uff0c\u5728 2013 \u5e74\u7684 Eurocrypt \u4e0a\uff0c\u4ed6\u53d1\u8868\u4e86\u4e00\u7bc7\u8bba\u6587\u2014\u2014\u300aNew collision attacks on SHA-1 based on optimal joint local-collision analysis\u300b\uff0c\u63d0\u51fa\u4e86\u6784\u9020 SHA-1 \u78b0\u649e\u7684\u4e00\u79cd\u65b0\u7684\u653b\u51fb\u65b9\u6cd5\uff08\u653b\u51fb\u590d\u6742\u5ea6\u4e3a 2 \u7684 61 \u6b21\u65b9\uff0c\u968f\u540e\u53c8\u63d0\u51fa\u4e86\u57fa\u4e8e GPU \u7684\u9ad8\u6548\u5b9e\u73b0\u65b9\u6cd5\uff09\uff0c\u968f\u540e\u6570\u5e74\u4e0d\u65ad\u63d0\u51fa\u4e86\u65b0\u7684\u6539\u8fdb\u65b9\u6cd5\uff0c\u5728 2016 \u5e74\u4ed6\u7ed9\u51fa\u4e86\u5173\u4e8e SHA-1 \u7b97\u6cd5\u7684 Freestart collision\uff0c\u4e5f\u5c31\u662f\u627e\u5230\u4e86 SHA-1 \u7b97\u6cd5\u5185\u90e8\u7684\u6838\u5fc3\u7ec4\u4ef6 internal compression function \u7684\u4e00\u4e2a\u78b0\u649e\u5b9e\u4f8b\uff0864 GPU \u96c6\u7fa4\uff0c10 \u5929\u8ba1\u7b97\u91cf\uff09\uff0c\u8fd9\u5c31\u5df2\u7ecf\u5439\u54cd\u4e86\u653b\u514b SHA-1 \u5b8c\u5168\u5b9e\u9645\u78b0\u649e\u653b\u51fb\u7684\u51b3\u6218\u53f7\u89d2\u3002\u7ec8\u4e8e\uff0c\u5728 Google \u516c\u53f8\u5f3a\u6709\u529b\u7684\u8ba1\u7b97\u8d44\u6e90\u652f\u6301\u4e4b\u4e0b\uff0c\u5728 2017 \u5e74 2 \u6708 23 \u65e5\uff0cSHA-1 \u7b97\u6cd5\u7684\u78b0\u649e\u5b9e\u4f8b\u51fa\u73b0\u5728\u6211\u4eec\u9762\u524d\uff01<\/p>\n

\u6b64\u6b21\u653b\u51fb\u5230\u5e95\u4f7f\u7528\u4e86\u591a\u5f3a\u7684\u8ba1\u7b97\u8d44\u6e90\uff0c\u6211\u4eec\u53ef\u4ee5\u770b\u4e00\u4e0b\u8c37\u6b4c\u5b89\u5168\u535a\u5ba2\u7ed9\u51fa\u7684\u539f\u59cb\u6570\u636e\uff1a<\/p>\n