Adrian Irving-Beer <[EMAIL PROTECTED]> writes: [...]
> Let's say I have a particular piece of data that MD5 hashes into a > paricular hash value (we'll call it MD5-A), and SHA1 hashes into > another value (SHA1-A). > > Let's say I then manage to 'break' MD5, by creating another piece of > data that has the same MD5 hash (MD5-A). > > My question is, would that different piece of data also have an SHA1 > hash of SHA1-A? Or would it have some other SHA1 code (SHA1-B)? Almost certainly the latter. (That is, as far as I'm aware there's no particular connection between the two. They're both apparently from a similar family of algorithms, which is causing people to propose significant new research efforts into hashing algorithms, but finding collisions in one doesn't help in finding collisions in the other, as far as I'm aware.) Better, as Tom suggests, to try and separate out the issues. Graydon wrote something related a while ago, <http://www.venge.net/monotone/docs/Hash-Integrity.html>, arguing that one should consider separately mechanisms for detecting accidental modifications and mechanisms for determining trust. [...] _______________________________________________ Gnu-arch-users mailing list [email protected] http://lists.gnu.org/mailman/listinfo/gnu-arch-users GNU arch home page: http://savannah.gnu.org/projects/gnu-arch/
