MD5 is not secure for applications that blindly sign inputs from non-trusted parties that can predict the content of the part of the message before the submitted text. This is an attack on the collision-resistance of the function.

I assume that for a cryptographic hash function to be called "secure", it has to be BOTH preimage and collision-resistant (respectively secure for all the usual uses). Obviously, the collision resistance (respectively security in certain usual uses) is not given, so I call it not secure.

MD5 signature support should be removed
as soon as reasonably possible.

...and it goes down hill from there...

Sorry, I maybe did not make clear that it should be dropped for verifying certificate signatures as valid only. As was proven, the attack on MD5 in that case is a very realistic one. I hope you did read my explaination what I call "reasonably possible", which is more than a year to allow a soft switch. I was NOT calling to remove it immediately. If I missed something, please tell me what so I can learn from my mistakes.

Jan

--
Please avoid sending mails, use the group instead.
If you really need to send me an e-mail, mention "FROM NG"
in the subject line, otherwise my spam filter will delete your mail.
Sorry for the inconvenience, thank the spammers...
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to