Using MD5 to verify file integrity is often used in conjunction with file compression such as gzip or bzip2.
Finding an arbitrary set of bits that result in the same MD5 hash (that has been shown to be possible) is one thing, but finding a specific set of bits that result in the same MD5 hash and also the characteristic of being able to be successfully uncompressed is much different. Compounding that with being about to alter the code in a meaningful way that results in a malicious trojan horse makes the task sufficiently difficult that I'm not terribly worried about it at this point.
-
Are you posting in the right place? Check out Where do I post X? to know for sure.
-
Posts may use any of the Perl Monks Approved HTML tags. Currently these include the following:
<code> <a> <b> <big>
<blockquote> <br /> <dd>
<dl> <dt> <em> <font>
<h1> <h2> <h3> <h4>
<h5> <h6> <hr /> <i>
<li> <nbsp> <ol> <p>
<small> <strike> <strong>
<sub> <sup> <table>
<td> <th> <tr> <tt>
<u> <ul>
-
Snippets of code should be wrapped in
<code> tags not
<pre> tags. In fact, <pre>
tags should generally be avoided. If they must
be used, extreme care should be
taken to ensure that their contents do not
have long lines (<70 chars), in order to prevent
horizontal scrolling (and possible janitor
intervention).
-
Want more info? How to link
or How to display code and escape characters
are good places to start.
|