Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 Aug 2004 10:16:37 +0200
From:      Borja Marcos <borjamar@sarenet.es>
To:        freebsd-security@freebsd.org
Subject:   Re: Report of collision-generation with MD5
Message-ID:  <176CF1F4-F1B8-11D8-9F60-000393C94468@sarenet.es>
In-Reply-To: <41239B0C.1000703@rdslink.ro>
References:  <200408181724.i7IHORYl013375@bunrab.catwhisker.org> <20040818175804.GI346@cowbert.net> <41239B0C.1000703@rdslink.ro>

next in thread | previous in thread | raw e-mail | index | archive | help

On 18 Aug 2004, at 20:08, Claudiu wrote:

> hello,
>
> please explain what do you mean by "reverse the hash". Is this the 
> recreation of the originial message from its hash ?

	You cannot reverse a hash. By definition, it is a non-reversible 
mathematical function.
If you get a set of messages and apply a hash to each of them, given a 
big enogh set of messages you will find that some of them have the same 
hash. The issue is not the existence of collisions. It is obvious that 
there will be collisions. The issue is how easy or hard it is to find a 
collision.

	Imagine a very simple hash: a checksum. Given a message, M, it is 
trivial to generate another message with the same checksum. However, 
using a "cryptographically secure" hash, there is no easy method to do 
that, other than brute force.

	What researchers have discovered could lead to a shortcut, easier (and 
cheaper) to perform that a brute force search for collision finding. It 
does not mean that those digests are "broken", but indeed it means that 
they are less secure than previously thought.




	Borja.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?176CF1F4-F1B8-11D8-9F60-000393C94468>