Tag: md5

  • It’s 2016. Can we stop using MD5 in malware analyses?

    When a security researcher comes across a new piece of malware, the first thing he (or she) does is check the file hash to see if it has been seen, or maybe even analysed, before. For that reason, if the researcher does end up writing an analysis, it is considered good practice to add the…

  • It’s 2016. Can we stop using MD5 in malware analyses?

    When a security researcher comes across a new piece of malware, the first thing he (or she) does is check the file hash to see if it has been seen, or maybe even analysed, before. For that reason, if the researcher does end up writing an analysis, it is considered good practice to add the…

  • How broken is SHA-1 really?

    Earlier this month, I gave a talk entitled ” How Broken Is Our Crypto Really? ” at the RSA Conference in San Francisco. In the presentation, I looked at vulnerabilities found in cryptographic protocols and analysed the likeliness of these being exploited in practice. I spent a few minutes talking about SHA-1 and stated that…

  • Throwback Thursday: Hash Woes

    Just last week, VB Editor Martijn Grooten addressed an audience at the RSA Conference in San Francisco on the topic of cryptographic protocols that have supposedly been broken in recent years, including the SHA-1 hash function which is considered all but broken. Back in 2004, the entire crypto community was abuzz with the astonishing news that a…