SciELO - Scientific Electronic Library Online

 
vol.23 número4Intelligent Case-Based System for Decision-Making in the Electricity SectorAjuste en luminancia y espacios de color para generar contrastes visibles en personas con daltonismo tricromático anómalo índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Revista

Articulo

Indicadores

Links relacionados

  • No hay artículos similaresSimilares en SciELO

Compartir


Computación y Sistemas

versión On-line ISSN 2007-9737versión impresa ISSN 1405-5546

Resumen

DOMINGUEZ PEREZ, Luis J.; GOMEZ TRUJILLO, Laiphel M.; CRUZ CORTES, Nareli  y  RODRIGUEZ HENRIQUEZ, Francisco. On the Impact of the SHA-1 Collider on Mexican Digital Firms with Legal Value. Comp. y Sist. [online]. 2019, vol.23, n.4, pp.1181-1190.  Epub 09-Ago-2021. ISSN 2007-9737.  https://doi.org/10.13053/cys-23-4-3103.

Security warranties of the RSA-type digital signatures are based on two main hypothesis: First, in the assumption that factoring gigantic integer numbers is a computationally unfeasible problem. Second, in the assumption that hash functions produce a unique digest for any digital document. With these two hypothesis in mind, in the last decades in México, and also in other countries, legislation has been enacted to legalize digital signatures. In México, the combination of the RSA algorithm and the SHA-1 hash function can be used to legally validate digital contracts. This selection of algorithms is known as the RSA-SHA-1 digital signature. However, recently the SHA-1 hash function has suffered a falsification attack in which, given an arbitrary document for which the SHA-1 digest was produced, it is possible to generate a second document with the same digest. In other words, this attack permits to find arbitrary pairs of documents that share the same digest. This situation has provoked that the RSA-SHA-1 algorithm used to sign legal contracts is on risk to be broken. In this article, some of the repercussions in the information security of the legal documents signed with this protocol are discussed. We also discuss some countermeasures that can mitigate this vulnerability.

Palabras llave : SHA; digital signatures; RSA.

        · resumen en Español     · texto en Español     · Español ( pdf )