James A. Donald [EMAIL PROTECTED] writes:
--
On 6 Dec 2004 at 16:14, Dan Kaminsky wrote:
* Many popular P2P networks (and innumerable distributed
content databases) use MD5 hashes as both a reliable search
handle and a mechanism to ensure file integrity. This makes
them blind to any
From: James A. Donald [EMAIL PROTECTED]
Sent: Dec 7, 2004 6:57 PM
To: [EMAIL PROTECTED]
Subject: MD5 To Be Considered Harmful Someday
But even back when I implemented Crypto Kong, the orthodoxy was
that one should use SHA1, even though it is slower than MD5, so
it seems to me that MD5
--
On 6 Dec 2004 at 16:14, Dan Kaminsky wrote:
* Many popular P2P networks (and innumerable distributed
content databases) use MD5 hashes as both a reliable search
handle and a mechanism to ensure file integrity. This makes
them blind to any signature embedded within MD5 collisions.