Re: NSA "telephone monitoring" program

Hash: SHA1

"nemo_outis" <abc@xxxxxxx> wrote in

Those who wish to further examine the question of whether MD5 is
broken or not should scan the current thread on sci.crypt

HMAC-MD5 shown not compromized by MD5 collisions

Yes, you have right. The problem is that not all utilities are
using HMAC algorithms for e.g. key derivation, and HMAC can't be
used everywhere.

We have good alternatives, so why we should not use them? We have
*no* benefit from using MD5, so why stick to it? It doesn't matter
if it is completly broken or not. SHA1 is much stronger than MD5,
and we will still move to better hash functions.


Version: PGP 8.1


Relevant Pages

  • Re: if SHA1 and MD5 are cracked...?
    ... which is that both SHA1 and ... > MD5 succumb to attack fairly soon, ... demanding an immediate recall of applications that use either MD5 or ... Theoretically there are two different types of security provided by hash ...
  • MD5 vs. SHA1: hashed passwords in /etc/master.passwd - can we configure SHA1 as default in /etc/
    ... MD5 seems to be compromised by potential collision attacks. ... hashing passwords for local users on a FreeBSD 7/8 box, ... possible hash algorithms selectable: ... hash algorithms like des, md5, sha1, blf or even sha256. ...
  • Re: [Newbie] Advice needed regarding SHA0 SHA1 MD5
    ... If you have some stored passwords hashed with md5, don't panic, ... choosing a more modern hash function. ... attacker has to find a string that matches it). ... Sha1 is still what pretty much everyone still uses. ...
  • RE: [fw-wiz] MD5 x SHA-1
    ... Basically there is a greater chance of an attacker being able to add nonce bytes to a modified file to get same hash with MD5 than SHA1. ... this algorythm compared to MD5. ...
  • Re: Best Performance File Compare: MD5/SHA1 or Byte-by-Byte Checking?
    ... SHA1 and MD5 will both require looping through the whole file just to ... generate the hash so in either method you're looping through both ... and assuming that the accuracy/reliability of SHA1 is ... What about MD5? ...