Industry News

MD5 Hash Broken via Collision Attack of Less Than $1

The MD5 hash collision attack that hijacked the Windows Update system back in 2012 was replicated with just 65 US cents worth of cloud computing fees, according to Nathaniel McHugh’s blog post.

The MD5 collision attack has been previously used by the Flame malware that spoofed its signing code with the one from Microsoft’s certificates using MD5 hash algorithm.

Keys on a sheet with encrypted data

McHugh used an open source application dubbed HashClash and modified it to separate images to generate an identical MD5 hash.

“So I guess the message to take away here is that MD5 is well and truly broken,” McHugh said. “Whilst the two images have not shown a break in the pre-image resistance, I cannot think of a single case where the use of a broken cryptographic hash function is an appropriate choice.”

The hash collision attack took 10 hours using a GPU session from Amazon Web Services which cost 65 US cents plus tax. The MD5 hash algorithm issue is that anyone has the means to generate the same hash from two separate inputs.

McHugh also advised that “no one should be using MD5 for anything. However, old habits die hard and once upon a time MD5 seemed like a fast and secure hash function.”

About the author

Lucian Ciolacu

Still the youngest Bitdefender News writer, Lucian is constantly after flash news in the security industry, especially when something is vulnerable or exploited. Besides digging for 'hacker' scoops and data leaks, he enjoys sports, such as football and tennis.
He has also combined an interest for social and political sciences, as a graduate of the Political Science Faculty, with a passion for guitar and computer games.

Add Comment

Click here to post a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.