CWI & Google Unveil Collision Attack on SHA-1 Algorithm

Marc Stevens (CWI) and Google jointly announce that they have broken the SHA-1 internet security standard in practice.

Today, Thursday 23 February 2017, researchers at the Dutch research institute CWI and Google jointly announce that they have broken the SHA-1 internet security standard in practice. This industry standard is used for digital signatures and file integrity verification, which secure credit card transactions, electronic documents, GIT open-source software repositories and software distribution. CWI cryptanalyst Marc Stevens says: “Many applications still use SHA-1, although it was officially deprecated by NIST in 2011 after exposed weaknesses since 2005. Our result proves that the deprecation by a large part of the industry has been too slow and that migration to safer standards should happen as soon as possible”.

Read the full article HERE

Read More

  • CWI spin-off DuckDB Labs partners with Motherduck, which raises $47.5 million

    CWI spin-off company DuckDB Labs helped create startup MotherDuck which aims to connect DuckDB to the cloud. MotherDuck sports some big names: its CEO is Jordan Tigani, founding engineer at Google’s BigQuery, Google’s fully managed data analysis platform. A big part of the $47.5 million funding comes from Andreessen Horowitz, a prominent venture capital firm, specialized in technology startups.

  • Building an international research community: HHAI Conference 2023

    Breaking ground as the first international conference on Hybrid Human Artificial Intelligence, HHAI22 held its first-ever in-person meeting in Amsterdam in the summer of 2022, establishing the beginnings of an international research community. ADS contributed to the conference by hosting a Meetup around the topic of Hybrid Intelligence.

  • Inaugural Speech Nanda Piersma

    There are legal rules and ethical frameworks, but little or no practical guidance on responsible design. In her inaugural lecture “System error, please restart”, Nanda Piersma argues what ‘responsible’ means and how we can carry out the (further) development of IT systems in such a way that they earn our trust.