1994-08-26 - Re: $10M breaks MD5 in 24 days

Header Data

From: alex <cp@omaha.com>
To: hfinney@shell.portal.com (Hal)
Message Hash: 7560da5d6922fc8bb8c34a9f08fc20caf31b1d7dfc8efc87393b8245363b5352
Message ID: <199408260001.TAA00715@omaha.omaha.com>
Reply To: <199408252058.NAA12488@jobe.shell.portal.com>
UTC Datetime: 1994-08-26 00:01:47 UTC
Raw Date: Thu, 25 Aug 94 17:01:47 PDT

Raw message

From: alex <cp@omaha.com>
Date: Thu, 25 Aug 94 17:01:47 PDT
To: hfinney@shell.portal.com (Hal)
Subject: Re: $10M breaks MD5 in 24 days
In-Reply-To: <199408252058.NAA12488@jobe.shell.portal.com>
Message-ID: <199408260001.TAA00715@omaha.omaha.com>
MIME-Version: 1.0
Content-Type: text


> One of the more interesting papers had a claim (with little detail,
> unfortunately) that for ten million dollars you could build a machine that
> would "break" MD5, in the sense of finding another message which would
> hash to the same as a chosen one, in 24 days.

This in itself wouldn't give an attacker much of anything would it?  I 
mean, once they discovered a message which hashed to a given value, the 
new message wouldn't be in the proper format, would it?  Wouldn't it just 
be noise, instead of text in english, crypto keys, etc.?






Thread