From: alex <cp@omaha.com>
To: hfinney@shell.portal.com (Hal)
Message Hash: 7560da5d6922fc8bb8c34a9f08fc20caf31b1d7dfc8efc87393b8245363b5352
Message ID: <199408260001.TAA00715@omaha.omaha.com>
Reply To: <199408252058.NAA12488@jobe.shell.portal.com>
UTC Datetime: 1994-08-26 00:01:47 UTC
Raw Date: Thu, 25 Aug 94 17:01:47 PDT
From: alex <cp@omaha.com>
Date: Thu, 25 Aug 94 17:01:47 PDT
To: hfinney@shell.portal.com (Hal)
Subject: Re: $10M breaks MD5 in 24 days
In-Reply-To: <199408252058.NAA12488@jobe.shell.portal.com>
Message-ID: <199408260001.TAA00715@omaha.omaha.com>
MIME-Version: 1.0
Content-Type: text
> One of the more interesting papers had a claim (with little detail,
> unfortunately) that for ten million dollars you could build a machine that
> would "break" MD5, in the sense of finding another message which would
> hash to the same as a chosen one, in 24 days.
This in itself wouldn't give an attacker much of anything would it? I
mean, once they discovered a message which hashed to a given value, the
new message wouldn't be in the proper format, would it? Wouldn't it just
be noise, instead of text in english, crypto keys, etc.?
Return to September 1994
Return to “Phil Karn <karn@qualcomm.com>”