The Pointlessness of the MD5 "attacks"
Ben Laurie
ben at algroup.co.uk
Wed Dec 15 09:15:02 EST 2004
Adam Back wrote:
> Is this the case? Can't we instead start with code C and malicious C'
> and try to find a collision on H(C||B) == H(C'||B') after trying 2^64
> B values we'll find such a collision by the birthday principle.
Indeed, but that is not the attack suggested.
> Now we can have people review and attest to the correctness of code C,
> and then we can MITM and change surrepticiously with C'.
And with only 2^64 effort. Let me know when you're done.
>
> Adam
>
> On Wed, Dec 15, 2004 at 08:44:03AM +0000, Ben Laurie wrote:
>
>>Adam Back wrote:
>>
>>>Well the people doing the checking (a subset of the power users) may
>>>say "I checked the source and it has this checksum", and another user
>>>may download that checksum and be subject to MITM and not know it.
>>
>>You are missing the point - since the only way to make this trick work
>>is to include a very specific chunk of 64 bytes with a few bits flipped
>>(or not), the actual malicious code must be present anyway and triggered
>>by the flipped bits. So, all of these attacks rely on the code not being
>>inspected or being sufficiently cunning that inspection didn't help.
>>And, if that's the case, the attacks work without any MD5 trickery.
>
>
>
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list