in reply to Re: On showing the weakness in the MD5 digest function and getting bitten by scalar context
in thread On showing the weakness in the MD5 digest function and getting bitten by scalar context
It's a HASH, for crying out loud. It's not meant to be provably perfect at identifying unique data streams.
Say you were expecting message M, with hash H. You instead get message N which also happens to hash to H.
You're worried about MD5 digests for showing falsification of data, right? Where some attacker alters the message? I contend that it will be pretty darned hard to find a useful attack on a message while maintaining MD5 integrity.
To Allied Commanders: Raiders Expected on Supply Lines in Sector 5. Keep on guard. --HQ
To Allied Commanders: No Raids Reported on Supply Lines for Sector 5, 6, or 8. Let Freedom Reign. --HQ
Until someone shows that you can (1) take any arbitrary data set M, (2) falsify it to data set N, by (3) modifying a limited portion of M in an application-useful way and (4) adding less than a gigabyte of additional data, and (5) still come out with M=>H and N=>H hash equivalence, I'll trust MD5, thanks.
--
[ e d @ h a l l e y . c c ]
|
---|