in reply to Re^7: On showing the weakness in the MD5 digest function and getting bitten by scalar context
in thread On showing the weakness in the MD5 digest function and getting bitten by scalar context
Yes, I think that would work.
A workaround might be quite easy though.
Produce 2 md5s. One from the whole file and another from the file minus 1 byte (first, last or middle). Or make the second md5 just the first half of the file; or from just the 10th, 20th, 30th etc. bytes (or whichever bytes the attack modifies to compromise the md5).
Now the attackers not only have the task of finding a duplicate file with the same md5, they have to produce one that matches two md5s.
Again, my math lets me down, but doesn't that make their job much, *much* harder?
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^9: On showing the weakness in the MD5 digest function and getting bitten by scalar context
by Anonymous Monk on Aug 29, 2004 at 14:52 UTC |