Friday, 10 June 2005

There is an interesting post describing the exploit of a weakness in MD5 via collisions, with a reproducible real-world example. The authors computationally found the collisions and were able to reliably and predictably produce two completely different postscript documents with the identical MD5 checksum. Their use-case story revolves around maliciously capturing a digital signature and using it for something other than it was intended. In the story, the MD5 checksum is relied upon to validate the authenticity of a document. The researchers wanted to show how this flaw could possibly be used in the real world.

"Recently, the world of cryptographic hash functions has turned into a mess. A lot of researchers announced algorithms ("attacks") to find collisions for common hash functions such as MD5 and SHA-1 (see [B+, WFLY, WY, WYY-a, WYY-b]). For cryptographers, these results are exciting - but many so-called "practitioners" turned them down as "practically irrelevant". The point is that while it is possible to find colliding messages M and M', these messages appear to be more or less random - or rather, contain a random string of some fixed length (e.g., 1024 bit in the case of MD5). If you cannot exercise control over colliding messages, these collisions are theoretically interesting but harmless, right? In the past few weeks, we have met quite a few people who thought so.

"With this page, we want to demonstrate how badly wrong this kind of reasoning is! We hope to provide convincing evidence even for people without much technical or cryptographical background."

Once again, security by obscurity defeated. Interesting read and might make you think. If anyone has comments on their test or process. I'd be interested to hear.



Add/Read: Comments [0]
IT Security | Tech
Friday, 10 June 2005 05:51:03 (Pacific Standard Time, UTC-08:00)
#  Trackback

Referred by:
http://ceiclavdutu357.land.ru/ [Referral]
http://search.daum.net/ [Referral]
http://droidgameapk.blogspot.com/2012/04/cafeteria-nipponica... [Referral]
http://www.greghughes.net/ [Referral]
http://forums.asp.net/p/895247/963037.aspx/ [Referral]
http://www.jeanstruereligion.org/ [Referral]
http://www.drebeatsheadphones.org/ [Referral]
http://www.beatsmonstersale.net/ [Referral]
http://forums.asp.net/p/895247/963037.aspx/1?Download+info+f... [Referral]
http://www.beatsbydreheadphonessale.net/ [Referral]
http://you-body.net/user/ArellutFalley/ [Referral]
http://koler.org/memberlist.php?mode=viewprofile&u=38527 [Referral]
http://www.jewelrymart86.com/European-style-jewelry [Referral]
http://forum.eurobilltracker.com/memberlist.php?mode=viewpro... [Referral]
http://www.psydj.com/phpbb3.00/memberlist.php?mode=viewprofi... [Referral]
http://femeie.ru/user/missionsanjo/ [Referral]
http://niochem.ru/forum/index.php?action=profile;u=51594 [Referral]
http://oskarfrank.livejournal.com/ [Referral]
http://ricrudur.livejournal.com/ [Referral]
http://xdoskx730.livejournal.com/ [Referral]
http://jdou.livejournal.com/ [Referral]

More...
Comments are closed.