Gervase Markham schrieb:
> Nils Maier wrote:
> [...]
>> PS: the Link-Fingerprints "standard" says:
>>> Clients are encouraged not to implement any hash algorithms other
>>> than MD5 and SHA-256, until and unless SHA-256 is found to have flaws.
>> MD5 is broken, you can find collisions in just hours.
>
> OK, then. I have a file with the following MD5:
> 6dfabd7a681569ac0b9d6b010bec88d6  /home/gerv/docs/hacking/doorbell.png
> Please find any other file (I'll make it easy, and won't require it to
> be a valid XPI with a trojan payload) with the same MD5 in "just hours",
> and send me a copy as an attachment.
>
> Gerv

Good overview incl. some conclusions by the author:
http://cryptography.hyperlink.cz/md5/MD5_collisions.pdf
Certificates:
http://www.win.tue.nl/~bdeweger/CollidingCertificates/
http://www.win.tue.nl/hashclash/TargetCollidingCertificates/
Chosen Prefix (impractical ATM):
http://www.win.tue.nl/hashclash/ChosenPrefixCollisions/
Nice Demo (different executables, chosen suffixes):
http://www.mscs.dal.ca/~selinger/md5collision/
ISO format remarks (see Updates):
http://cryptography.hyperlink.cz/2004/collisions.htm

And just to give you that warm fuzzy feeling you hoped for when you
created your "challenge":
No, it isn't that easily possible to create files for a given hash
(while they found better ways than brute-force already; see rainbow tables).
But that was never my point anyway (I talked about collisions)... And
does not make md5 less broken than I claimed and researchers found it was.

Nils
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to