Comments: How to Break MD5 and Other Hash Functions

Rivest has held water since 1992 now on to SHA-1 thru whatever to topple the FIPS. Now the question is who did what with whatever and where there damages. I sense a mad rush for the gates.

Posted by Jimbo at March 13, 2005 05:04 PM

What you have said here is not quite correct. A collision attack lets the creator create both documents that hash to the same thing. This is what the new results allow. A pre-image attack lets you create a document (meaningful or meaningless, it doesn't matter) that has a desired hash, such as the hash of a pre-existing document. So far the new techniques don't help with that.

Another point, Klima is following in the footsteps of the Wang et al results and not publishing his techniques. He makes his claims and publishes a collision, but breathes not a word about how the magic is done. Must have had something up his sleeves.

But it is great to see that Wang and company are finally coming out with the goods.

Posted by Cypherpunk at March 14, 2005 01:43 AM

ebeb3928b5f0d7b337c82c3c84a52f5a

please decrypt dis and send this to imal.lh30@gmail.com

Posted by imalsha at June 22, 2010 05:12 AM
Post a comment









Remember personal info?






Hit Preview to see your comment.
MT::App::Comments=HASH(0x558dc5cceb90) Subroutine MT::Blog::SUPER::site_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.