QUOTE(Mezmiro @ Apr 2 2006, 06:59 PM)

Well if the checksum algorithm even allows collisions, which I doubt it will allow any if any at all
It does; any message digest algorithm ("checksum" is a misnomer here) must allow collisions. This is obvious if you think about it: SHA-1 produces a 160-bit digest, which means there are 2^160 possible different digests. 2^160 is a very very large number, but it's infinitesimal next to the total number of possible messages.
QUOTE
the number of identical checksums that could be generated from different executables would be very small, very very small, like, really small.
Well, actually, it's infinite

But that doesn't mean it's easy to find collisions. In fact, it's extremely difficult.
QUOTE
But you know, if you want to analyze the checksum algorithm and try to scan through it, then by all means. You might find something interesting, but it will take a while.
Rather like saying that if I tried, I might find a cure for cancer, but it will take awhile. Hey, there's no harm in trying to find an easy way to generate SHA-1 collisions. But the finest mathematical minds in the world are working on the problem (and thus far have failed); it's unlikely that any of us could add anything to their efforts. But if we did, we'd be a lock for an Abel Prize.
That being said, SHA-1
is vulnerable to attack. The feasibility of finding SHA-1 collisions is much, much higher than that of cracking RSA keys. The U.S. government has decreed that SHA-1 should be phased out in favor of the longer-digest variants collectively known as SHA-2 by the next decade. This doesn't mean that you can expect custom-signed Xbox 360 executables anytime soon; it means that NSA mathematicians expect that enemy governments equipped with powerful supercomputer clusters
might be able to break signatures on critical national security documents after investing a mere several hundred thousand processor-years.
If that's not clear, here's an analogy. Suppose you, paranoid that sneak thieves might break into your house and steal your treasured collection of Beanie Babies, exactly replicate the setup they've got at Fort Knox on your home: dogs, armed guards, biometrics, foot-thick titanium steel vault doors, etc. Then the government decides that it'd be safest to upgrade the security at Fort Knox a notch. This doesn't mean that you suddenly need to be paranoid that a two-bit hood with a bobby pin is now a threat to your Beanies. You're probably still fine. And SHA-1 collision generation will probably remain well outside of the reach of the general public until long after we're all playing our Xbox 72000VRs with the cerebral interface.