Amateurs and pros vie to build new crypto standard

07.11.2008

That's supposed to be virtually impossible to do under a secure hash algorithm.

If the Nostradamus people could use collisions to perform their attack, would criminals eventually be able to create fake digital signatures and make phoney phishing sites look exactly like, for example, www.bankofamerica.com?

Maybe some day, said Bill Burr, a manager with NIST's Security Technology Group. "SHA-1 is not so broken at the moment that we think that people can do the collisions, but we're expecting the collision any day," he said. "The notion here is that we've got a dike and the dike is leaking, and we're kind of afraid that we could really have a flood."

Even though the latest SHA-2 algorithm "is likely to remain secure for the foreseeable future," it has limitations and is based on , said Schneier, who along with others has submitted a hashing algorithm called . "I think there is good reason to do it."

Picking the new hash algorithm won't be done overnight. NIST's Burr says he doesn't expect to have a SHA-3 winner until 2012, and it may take a decade more for the algorithm to be widely adopted, he said.