Retired Cryptocloud forum
Retired Cryptocloud forum
Retired Cryptocloud forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Retired Cryptocloud forum

forum moved to permanent home at cryptocloud.org!
 
HomeHome  SearchSearch  Latest imagesLatest images  RegisterRegister  Log in  
Search
 
 

Display results as :
 
Rechercher Advanced Search
Keywords
delay
Latest topics
» time to move to our new home
Hash collision magicks in Flame malware {Ars Tech} EmptyThu Jan 24, 2013 4:54 am by wearehidden

» time to move to our new home
Hash collision magicks in Flame malware {Ars Tech} EmptyThu Jan 24, 2013 4:53 am by wearehidden

» time to move to our new home
Hash collision magicks in Flame malware {Ars Tech} EmptyThu Jan 24, 2013 4:53 am by wearehidden

» time to move to our new home
Hash collision magicks in Flame malware {Ars Tech} EmptyThu Jan 24, 2013 4:53 am by wearehidden

» LA Server performing better lately
Hash collision magicks in Flame malware {Ars Tech} EmptyWed Jan 02, 2013 2:19 pm by Apococrypto

» ubuntu 12.04 openvpn timeout
Hash collision magicks in Flame malware {Ars Tech} EmptySun Dec 30, 2012 10:23 pm by Pattern_Juggled

» The knowledge base for canceling an account is outdated (please cancel my account)
Hash collision magicks in Flame malware {Ars Tech} EmptySun Dec 30, 2012 10:09 pm by Pattern_Juggled

» Beta announcement of new Cryptocloud forum
Hash collision magicks in Flame malware {Ars Tech} EmptySun Dec 30, 2012 9:54 pm by Pattern_Juggled

» Crytpo Cloud password authentication issue problem again
Hash collision magicks in Flame malware {Ars Tech} EmptyFri Dec 28, 2012 3:59 pm by Pattern_Juggled

April 2024
MonTueWedThuFriSatSun
1234567
891011121314
15161718192021
22232425262728
2930     
CalendarCalendar
Affiliates
free forum


 

 Hash collision magicks in Flame malware {Ars Tech}

Go down 
AuthorMessage
Pattern_Juggled
Admin
Pattern_Juggled


Posts : 57
Join date : 2012-08-04

Hash collision magicks in Flame malware {Ars Tech} Empty
PostSubject: Hash collision magicks in Flame malware {Ars Tech}   Hash collision magicks in Flame malware {Ars Tech} EmptyMon Aug 06, 2012 1:38 am

This is some seriously high-end stuff... worth watching, even for us mere mortals! - Pt_Jd


Quote :
Crypto breakthrough shows Flame was designed by world-class scientists
The spy malware achieved an attack unlike any cryptographers have seen before.

by Dan Goodin - June 7 2012, 11:20am PDT


The Flame espionage malware that infected computers in Iran achieved mathematic breakthroughs that could only have been accomplished by world-class cryptographers, two of the world's foremost cryptography experts said.

"We have confirmed that Flame uses a yet unknown MD5 chosen-prefix collision attack," Marc Stevens wrote in an e-mail posted to a cryptography discussion group earlier this week. "The collision attack itself is very interesting from a scientific viewpoint, and there are already some practical implications." Benne de Weger, a Stevens colleague and another expert in cryptographic collision attacks who was briefed on the findings, concurred.

"Collision" attacks, in which two different sources of plaintext generate identical cryptographic hashes, have long been theorized. But it wasn't until late 2008 that a team of researchers made one truly practical. By using a bank of 200 PlayStation 3 consoles to find collisions in the MD5 algorithm—and exploiting weaknesses in the way secure sockets layer certificates were issued—they constructed a rogue certificate authority that was trusted by all major browsers and operating systems. Stevens, from the Centrum Wiskunde & Informatica in Amsterdam, and de Weger, of the Technische Universiteit Eindhoven were two of the seven driving forces behind the research that made that 2008 attack possible.

Flame is the first known example of an MD5 collision attack being used maliciously in a real-world environment. It wielded the esoteric technique to digitally sign malicious code with a fraudulent certificate that appeared to originate with Microsoft. By deploying fake servers on networks that hosted machines already infected by Flame—and using the certificates to sign Flame modules—the malware was able to hijack the Windows Update mechanism Microsoft uses to distribute patches to hundreds of millions of customers.

According to Stevens and de Weger, the collision attack performed by Flame has substantial scientific novelty. They arrived at that conclusion after Stevens used a custom-designed forensic tool he developed to detect and analyze hash collisions.

"More interestingly, the results have shown that not our published chosen-prefix collision attack was used, but an entirely new and unknown variant," Stevens wrote in a statement distributed on Thursday. "This has led to our conclusion that the design of Flame is partly based on world-class cryptanalysis. Further research will be conducted to reconstruct the entire chosen-prefix collision attack devised for Flame."

The analysis reinforces theories that researchers from Kaspersky Lab, CrySyS Lab, and Symantec published almost two weeks ago. Namely, Flame could only have been developed with the backing of a wealthy nation-state. Stevens' and de Weger's conclusion means that, in addition to a team of engineers who developed a global malware platform that escaped detection for at least two years, Flame also required world-class cryptographers who have broken new ground in their field.

"It's not a garden-variety collision attack, or just an implementation of previous MD5 collisions papers—which would be difficult enough," Matthew Green, a professor specializing in cryptography in the computer science department at Johns Hopkins University, told Ars. "There were mathematicians doing new science to make Flame work."
Back to top Go down
http://2600.com
 
Hash collision magicks in Flame malware {Ars Tech}
Back to top 
Page 1 of 1
 Similar topics
-
» The long arm of (Amerikan) law... {Ars Tech}

Permissions in this forum:You cannot reply to topics in this forum
Retired Cryptocloud forum :: Cryptocloud.org :: General Discussion-
Jump to: