SciELO - Scientific Electronic Library Online

 
vol.23 issue4Intelligent Case-Based System for Decision-Making in the Electricity SectorAdjustment in Luminance and Color Spaces to Generate Contrasts Visible for People with Abnormal Trichromatic Color Blindness author indexsubject indexsearch form
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • Have no similar articlesSimilars in SciELO

Share


Computación y Sistemas

On-line version ISSN 2007-9737Print version ISSN 1405-5546

Abstract

DOMINGUEZ PEREZ, Luis J.; GOMEZ TRUJILLO, Laiphel M.; CRUZ CORTES, Nareli  and  RODRIGUEZ HENRIQUEZ, Francisco. On the Impact of the SHA-1 Collider on Mexican Digital Firms with Legal Value. Comp. y Sist. [online]. 2019, vol.23, n.4, pp.1181-1190.  Epub Aug 09, 2021. ISSN 2007-9737.  https://doi.org/10.13053/cys-23-4-3103.

Security warranties of the RSA-type digital signatures are based on two main hypothesis: First, in the assumption that factoring gigantic integer numbers is a computationally unfeasible problem. Second, in the assumption that hash functions produce a unique digest for any digital document. With these two hypothesis in mind, in the last decades in México, and also in other countries, legislation has been enacted to legalize digital signatures. In México, the combination of the RSA algorithm and the SHA-1 hash function can be used to legally validate digital contracts. This selection of algorithms is known as the RSA-SHA-1 digital signature. However, recently the SHA-1 hash function has suffered a falsification attack in which, given an arbitrary document for which the SHA-1 digest was produced, it is possible to generate a second document with the same digest. In other words, this attack permits to find arbitrary pairs of documents that share the same digest. This situation has provoked that the RSA-SHA-1 algorithm used to sign legal contracts is on risk to be broken. In this article, some of the repercussions in the information security of the legal documents signed with this protocol are discussed. We also discuss some countermeasures that can mitigate this vulnerability.

Keywords : SHA; digital signatures; RSA.

        · abstract in Spanish     · text in Spanish     · Spanish ( pdf )