Maybe I misunderstood what I read? Maybe, there is an application that allows the fact the the alternative plaintext is gibberish to be ignored and compromise something?Don't know if I got that correctly, but sabotaging a p2p network could be such an application. If a p2p network uses hashes to identify files, you could use this weakness to supply gibberish data (parts) to prevent successful downloads.
In reply to Re^7: On showing the weakness in the MD5 digest function and getting bitten by scalar context
by Anonymous Monk
in thread On showing the weakness in the MD5 digest function and getting bitten by scalar context
by grinder
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |