NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: bin/44160: outdated claim of cryptographic strength in md5(1) man page



The following reply was made to PR bin/44160; it has been noted by GNATS.

From: Alistair Crooks <agc%pkgsrc.org@localhost>
To: gnats-bugs%NetBSD.org@localhost
Cc: gnats-admin%NetBSD.org@localhost, netbsd-bugs%NetBSD.org@localhost
Subject: Re: bin/44160: outdated claim of cryptographic strength in md5(1) man 
page
Date: Sat, 27 Nov 2010 05:48:52 +0100

 On Sat, Nov 27, 2010 at 03:45:00AM +0000, Taylor R Campbell wrote:
 >      The md5(1) man page claims of MD5 message digests that
 > 
 >              `It is conjectured that it is computationally
 >              infeasible to produc[e] two messages having the same
 >              message digest, or to produce any message having a
 >              given prespecified target message digest.'
 > 
 >      This has not been true for many years.  In particular, not only
 >      have collisions been found, but they are so easy to find that
 >      they have been used successfully to forge x.509 certificates
 >      from commercial certification authorities; see
 >      <http://www.win.tue.nl/hashclash/rogue-ca/>.
 
 Beware of confusing two different things; the first part of the quoted
 sentence relates to weak collisions, and you are correct that time has
 overtaken the text.  The second part of the sentence relates to
 pre-imaging attacks, and the current (theoretical) pre-imaging
 weakness of md5 (from 2009) is 2^123.4 - http://en.wikipedia.org/wiki/MD5
 
        "In April 2009, a preimage attack against MD5 was published
        that breaks MD5's preimage resistance.  This attack is only
        theoretical, with a computational complexity of 2123.4 for
        full preimage and 2116.9 for a pseudo-preimage.[27]"
 
 Regards,
 Alistair
 


Home | Main Index | Thread Index | Old Index