1994-08-29 - Re: $10M breaks MD5 in 24 days

Header Data

From: “Perry E. Metzger” <perry@imsi.com>
To: Phil Karn <karn@qualcomm.com>
Message Hash: af1c581836ba7fb4652664423e53abae599adba7cd3707b316286e5e7e7de9f2
Message ID: <9408290001.AA09827@snark.imsi.com>
Reply To: <199408280651.XAA13677@servo.qualcomm.com>
UTC Datetime: 1994-08-29 00:01:30 UTC
Raw Date: Sun, 28 Aug 94 17:01:30 PDT

Raw message

From: "Perry E. Metzger" <perry@imsi.com>
Date: Sun, 28 Aug 94 17:01:30 PDT
To: Phil Karn <karn@qualcomm.com>
Subject: Re: $10M breaks MD5 in 24 days
In-Reply-To: <199408280651.XAA13677@servo.qualcomm.com>
Message-ID: <9408290001.AA09827@snark.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain



Phil Karn says:
> >Well, I suppose this demonstrates that the NSA knew what they were
> >doing when they set the SHA's length to 160 bits. Let it never be said
> >that they aren't right on top of everything...
> 
> On the other hand, I can't imagine that NSA is unaware that strong
> cryptographic hash functions designed for authentication are also
> useful building blocks for a confidentiality cipher. Which might make
> them less than wholly enthusiastic about doing their best on a public
> standard like SHA.

True enough. However, we don't have a lot of alternatives right now.
MD6, anyone?

.pm





Thread