Pathologically Eclectic Rubbish Lister | |
PerlMonks |
Re^2: On showing the weakness in the MD5 digest function and getting bitten by scalar contextby halley (Prior) |
on Aug 27, 2004 at 18:37 UTC ( [id://386462]=note: print w/replies, xml ) | Need Help?? |
No doubt. There are a LOT of namby-pamby Chicken Littles running around crying about MD5's weaknesses.
It's a HASH, for crying out loud. It's not meant to be provably perfect at identifying unique data streams.
Say you were expecting message M, with hash H. You instead get message N which also happens to hash to H.
You're worried about MD5 digests for showing falsification of data, right? Where some attacker alters the message? I contend that it will be pretty darned hard to find a useful attack on a message while maintaining MD5 integrity.
Until someone shows that you can (1) take any arbitrary data set M, (2) falsify it to data set N, by (3) modifying a limited portion of M in an application-useful way and (4) adding less than a gigabyte of additional data, and (5) still come out with M=>H and N=>H hash equivalence, I'll trust MD5, thanks. --
In Section
Meditations
|
|