* Nikos Mavrogiannopoulos:

> That's what I say above. No real attacks exist although its security
> is questioned (ECRYPT II report on algorithms and key sizes). The text
> mentions: "The recent advances in the cryptanalysis of MD5 (see Section
> 10.3), and specifically HMAC-MD5 (e.g. [58, 143, 213, 83, 256]), suggest
> that implementers should move away from HMAC-MD5 as soon as possible."

Apparently, it's not yet possible.  And there have been claims tha
tthe MD5 attacks do not apply at all to HMAC-MD5.  The way HMAC-MD5 is
used in TLS does not appear to be very demanding, either (a commitment
scheme could be worse, for instance).

-- 
Florian Weimer                <fwei...@bfk.de>
BFK edv-consulting GmbH       http://www.bfk.de/
Kriegsstraße 100              tel: +49-721-96201-1
D-76133 Karlsruhe             fax: +49-721-96201-99



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to