Colin Plumb wrote:

>Actually, MD5 is still holding up, but Dobbertin has indeed dented it.
>Frankly, it would take a *hell* of a determined attacker to manage
>to turn it into a successful securitty exploit if it's used for
>file checksums.

I agree here.  Still, it's probably better to move away from MD5 if
there are no serious consequences in doing so.  We don't know the
current state of the art in cracking secure hashes, and for some
applications, like the web of trust for PGP keys, MD5 should already
should be considered inappropriate.

>SHA's GFSR implementation means that any two inputs will have a large
>Hamming distance in the scheduled key, i.e. lots of rounds will have
>their keys altered.  The "bug fix" in SHA-1 further increases this
>tendency.

Is anybody aware of WHAT attack this fix was against?

>I have no fear of RIPEMD-160; it's certainly strong, but it's also
>slower than necessary and has more unproven techniques, and I don't
>quite see the reason to put up with that.

Using the reference you provided, I got around three Megabytes/ CPU
second on a P133 with RIPEMD-160 (using pgcc -O6, I confess :-)  How
fast is SHA-1 in comprarison?
-- 
Thomas Koenig, [EMAIL PROTECTED], [EMAIL PROTECTED]
The joy of engineering is to find a straight line on a double
logarithmic diagram.


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] . 
Trouble?  e-mail to [EMAIL PROTECTED] .

Reply via email to