D
Dustin Cook
We've known since the middle of the nineties that breaking MD5 was within
reach. The fact there has been so much inertia in getting people to change
is quite incredible really.
At Toorcon this year, Dan Kaminsky showed a way to create two different
webpages that render properly in a browser but have the same MD5 hash.
Anybody who thinks this attack is theortical and ignorable is grossly
mistaken.
There is a known result about MD5 hash function, is this: If MD5(x) == MD5
(y) then MD5(x+q) == MD5(y+q) So, if you have a pair of messages, x and y,
with the same MD5 value, you can append a payload q, and the MD5 value
keeps the same, the size of q is arbitrary.
Source: http://it.slashdot.org/article.pl?sid=05/09/23/0618252
4Q, Comments?
--
Dustin Cook
Author of BugHunter - MalWare Removal Tool - v2.2c
email: (e-mail address removed)
web..: http://bughunter.it-mate.co.uk
Pad..: http://bughunter.it-mate.co.uk/pad.xml
reach. The fact there has been so much inertia in getting people to change
is quite incredible really.
At Toorcon this year, Dan Kaminsky showed a way to create two different
webpages that render properly in a browser but have the same MD5 hash.
Anybody who thinks this attack is theortical and ignorable is grossly
mistaken.
There is a known result about MD5 hash function, is this: If MD5(x) == MD5
(y) then MD5(x+q) == MD5(y+q) So, if you have a pair of messages, x and y,
with the same MD5 value, you can append a payload q, and the MD5 value
keeps the same, the size of q is arbitrary.
Source: http://it.slashdot.org/article.pl?sid=05/09/23/0618252
4Q, Comments?
--
Dustin Cook
Author of BugHunter - MalWare Removal Tool - v2.2c
email: (e-mail address removed)
web..: http://bughunter.it-mate.co.uk
Pad..: http://bughunter.it-mate.co.uk/pad.xml