Podcast
Root Causes 68: Why SHA-1 Is No Longer Secure


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
February 24, 2020
SHA-1 was a cornerstone of the early secure web. Now, 25 years later, this hashing function is no longer secure. Join our hosts to hear the history of SHA-1, its common use cases, and the properties of an effective hashing function. Learn about collision attacks and why they matter. Find out the reasons SHA-1 is still in use and why it is no longer secure in today's computing world.
Podcast Transcript
Lightly edited for flow and brevity.
A hash function is any function that can be used to map data of an arbitrary size to a fixed size value. So therefore, Tim, you know, pick any sentence or just stream of text of various sizes, run it through a hash function, and then that should be chunked up into a value, which is of a given length and regardless of the length of the key value that's fitted into that hash function, the hash value will be of a given length, regardless of the size of the key length.
So, this is legacy implementations. This is things that were created long ago, that are still in the system somewhere. Perhaps they are - - perhaps there's some trepidation to deal with them because people don't know that the code is fully understood. They don't necessarily know - - like the people who wrote that might not be with the company anymore and even if they are heck, they don't remember why they made the decisions they made way back then and there's generally a sense of if I don't have to monkey with this, I would rather not. Is that right?
So, SHA-1 is being used primarily because people have had implementations in place for a long time and there is some amount of concern or trepidation to mess with them or just you know, they have busy schedules and lots of stuff on the roadmap and, you know, it's hard to get for this to bubble to the top or just, it's kind of out of sight out of mind. Does that sound right?
And that's a valid point as well. And there's crypto agility, and all kinds of other things that are out of scope for this discussion. Jay, very important message. I'm glad we recorded this. Hopefully, people who are listening to this are thinking hard about whether or not they're using SHA-1 and finding out if you're using SHA-1. You might not know it. And those are very valuable things to do because you'd hate to find out the hard way.

