Patrick W. Gilmore wrote:
> I repeat something I've said a couple times in this thread: If I can
> somehow create two docs with the same hash, and somehow con someone
> into using one of them, chances are there are bigger problems than a
> SHA1 hash collision.

This collision turns a theoretical aspiration into a simple matter of
financials, and those financials will only reduce over time.

The incident needs to be taken in the context of how md5, rc4 and other
hash functions were relentlessly battered to death over time.  After the
first collisions are found in a hash function, exploits only improve, so
NIST's advice in 2004 to retire all SHA1 usage by 2010 was sound.

>From a practical point of view, the danger that this presents is
hypothetical for most people right now.  It's just not worth spending
6000 years of CPU time in order to steal €1000 from someone's bank.  But
by the same token, there are plenty of people in the world who would be
happy to invest this sort of computing power if the target were valuable
enough.

Nick

Reply via email to