[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Chinese Professor Cracks Fifth Data SecurityAlgorithm (SHA-1)
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] Chinese Professor Cracks Fifth Data SecurityAlgorithm (SHA-1)
- From: "Dave \"No, not that one\" Korn" <davek_throwaway@xxxxxxxxxxx>
- Date: Thu, 22 Mar 2007 14:16:27 -0000
Tim wrote:
> Hello,
>
> On Wed, Mar 21, 2007 at 06:45:19PM +0300, 3APA3A wrote:
>> Dear Michael Silk,
>>
>> First, by reading 'crack' I thought lady can recover full
>> message by it's signature. After careful reading she can bruteforce
>> collisions 2000 times faster.
>
> Both of you guys are confused.
>
> First off Michael: this is old news. It doesn't seem to indicate that
> finding collisions is any faster than 2^63, which was reported quite
> some time ago[1].
It's not just old news, but old old news, since we already had this
discussion about how it was old news back in january when the piece was
published...
cheers,
DaveK
--
Can't think of a witty .sigline today....
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/