Some notes to "MD5 To Be Considered Harmful Someday" - practical uses, additional attacks

2004-12-08 Thread Ondrej Mikle
I've read the paper. What is stunning, that I've written similar paper named "Practical Attacks on Digital Signatures Using MD5 Message Digest" using very similar techniques only recently. It was submitted to Cryptology ePrint Archive (http://eprint.iacr.org) a week ago, on December 2nd. They will

Re: MD5 To Be Considered Harmful Someday

2004-12-08 Thread John Kelsey
>From: "James A. Donald" <[EMAIL PROTECTED]> >Sent: Dec 7, 2004 6:57 PM >To: [EMAIL PROTECTED] >Subject: MD5 To Be Considered Harmful Someday >But even back when I implemented Crypto Kong, the orthodoxy was >that one should use SHA1, even though it is slower

Re: MD5 To Be Considered Harmful Someday

2004-12-08 Thread Eric Rescorla
"James A. Donald" <[EMAIL PROTECTED]> writes: > -- > On 6 Dec 2004 at 16:14, Dan Kaminsky wrote: >> * Many popular P2P networks (and innumerable distributed >> content databases) use MD5 hashes as both a reliable search >> handle and a mechanism to ensure file integrity. This makes >> them

MD5 To Be Considered Harmful Someday

2004-12-07 Thread James A. Donald
-- On 6 Dec 2004 at 16:14, Dan Kaminsky wrote: > * Many popular P2P networks (and innumerable distributed > content databases) use MD5 hashes as both a reliable search > handle and a mechanism to ensure file integrity. This makes > them blind to any signature embedded within MD5 collisions.

MD5 To Be Considered Harmful Someday

2004-12-06 Thread Dan Kaminsky
al -- the paper's titled "MD5 To Be Considered Harmful Someday" for a reason. Some people have said there's no applied implications to Joux and Wang's research. They're wrong; arbitrary payloads can be successfully integrated into a hash collision. But the attack