Adrian Irving-Beer <[EMAIL PROTECTED]> writes:

[...]

> Let's say I have a particular piece of data that MD5 hashes into a
> paricular hash value (we'll call it MD5-A), and SHA1 hashes into
> another value (SHA1-A).
>
> Let's say I then manage to 'break' MD5, by creating another piece of
> data that has the same MD5 hash (MD5-A).
>
> My question is, would that different piece of data also have an SHA1
> hash of SHA1-A?  Or would it have some other SHA1 code (SHA1-B)?

Almost certainly the latter.  (That is, as far as I'm aware there's no
particular connection between the two.  They're both apparently from a
similar family of algorithms, which is causing people to propose
significant new research efforts into hashing algorithms, but finding
collisions in one doesn't help in finding collisions in the other, as
far as I'm aware.)

Better, as Tom suggests, to try and separate out the issues.  Graydon
wrote something related a while ago,
<http://www.venge.net/monotone/docs/Hash-Integrity.html>, arguing that
one should consider separately mechanisms for detecting accidental
modifications and mechanisms for determining trust.

[...]



_______________________________________________
Gnu-arch-users mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/gnu-arch-users

GNU arch home page:
http://savannah.gnu.org/projects/gnu-arch/

Reply via email to