Re: Report of collision-generation with MD5
From: Peter C. Lai (sirmoo_at_cowbert.net)
Date: Wed, 18 Aug 2004 13:58:04 -0400 To: David Wolfskill <email@example.com>
Well while collisions are cryptographically significant, they don't
necessarily impact any operational security of the the hash. (Since the
collision merely means that there are possibly two inputs which will hash to
the same digest). Where this could theoretically mean that someone could
alter a signed message, we have to look at the chance that what was intended
to be altered will satisfy the conditions for the collision. The only 'real'
worry about this issue is that if MD5 is already cryptographically challenged
in this manner, it may be more possible to find a way to reverse the hash.
You can read the discussion here:
On Wed, Aug 18, 2004 at 10:24:27AM -0700, David Wolfskill wrote:
> Just got a pointer to this via ACM "TechNews Alert" for today:
> Seems that "... French computer scientist Antoine Joux reported on
> Aug. 12 his discovery of a flaw in the MD5 algorithm, which is often
> used with digital signatures...."
> There's more in the article cited above.
> David H. Wolfskill firstname.lastname@example.org
> Evidence of curmudgeonliness: becoming irritated with the usage of the
> word "speed" in contexts referring to quantification of network
> performance, as opposed to "bandwidth" or "latency."
> email@example.com mailing list
> To unsubscribe, send any mail to "firstname.lastname@example.org"
-- Peter C. Lai University of Connecticut Dept. of Molecular and Cell Biology Yale University School of Medicine SenseLab | Research Assistant http://cowbert.2y.net/ _______________________________________________ email@example.com mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "firstname.lastname@example.org"