1995-12-10 - Re: Windows .PWL cracker implemented as a Word Basic virus

Header Data

From: daw@quito.CS.Berkeley.EDU (David A Wagner)
To: cypherpunks@toad.com
Message Hash: 1c02cf3c6ecfc60e010ee924ffd5d8a42e9a5011ae448fc84779cbc472b9da46
Message ID: <199512102320.SAA08162@bb.hks.net>
Reply To: N/A
UTC Datetime: 1995-12-10 23:22:56 UTC
Raw Date: Sun, 10 Dec 95 15:22:56 PST

Raw message

From: daw@quito.CS.Berkeley.EDU (David A Wagner)
Date: Sun, 10 Dec 95 15:22:56 PST
To: cypherpunks@toad.com
Subject: Re: Windows .PWL cracker implemented as a Word Basic virus
Message-ID: <199512102320.SAA08162@bb.hks.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In article <95Dec10.175318edt.1732@cannon.ecf.toronto.edu>,
SINCLAIR  DOUGLAS N <sinclai@ecf.toronto.edu> wrote:
> My understanding was that MD4 had been broken once, at the cost of 
> much computer time.

Not *that* much computer time...

In my copy of Hans Dobbertin's paper, the abstract says 

``An implementation of our 
attack allows to find collisions for MD4 in less than a minute on a PC.''

As far as I know, the difficulty of inverting MD4 is still an open
problem -- but why would you want to use a broken algorithm like MD4
when you can use MD2, MD5, or SHA?
- ---
[This message has been signed by an auto-signing service.  A valid signature
means only that it has been received at the address corresponding to the
signature and forwarded.]

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Gratis auto-signing service

iQBFAwUBMMtrRCoZzwIn1bdtAQGQwQF+JlWjDgMCs+Y6nO/tUzrXcd9wJCrTLHx2
NlC+1bHspTvJSXSD29M73rfeyOfWOTtQ
=4jl6
-----END PGP SIGNATURE-----





Thread