On Fri, 17 Apr 2009 11:19:31 -0700, Adam Olsen wrote:

> Actually, *cryptographic* hashes handle that just fine.  Even for files
> with just a 1 bit change the output is totally different.  This is known
> as the Avalanche Effect.  Otherwise they'd be vulnerable to attacks.
> 
> Which isn't to say you couldn't *construct* a pattern that it would be
> vulnerable to.  Figuring that out is pretty much the whole point of
> attacking a cryptographic hash.  MD5 has significant vulnerabilities by
> now, and other will in the future.  That's just a risk you need to
> manage.

There are demonstrated methods for constructing MD5 collisions against an 
arbitrary file in about a minute on a laptop computer.

http://en.wikipedia.org/wiki/MD5



-- 
Steven
--
http://mail.python.org/mailman/listinfo/python-list

Reply via email to