The Pointlessness of the MD5 "attacks"
James A. Donald
jamesd at echeque.com
Wed Dec 15 15:13:08 EST 2004
--
On 15 Dec 2004 at 8:51, Ben Laurie wrote:
> People seem to be having a hard time grasping what I'm trying
> to say, so perhaps I should phrase it as a challenge: find me
> a scenario where you can use an MD5 collision to mount an
> attack in which I could not mount an equally effective attack
> without using an MD5 collision.
I could circulate watermarked versions of copyrighted material
without it being apparent that they were watermarked.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
brRAUUDlwL/ZhPKf51gh0pzlr6ISDbBPNAbnzJfI
41Hx46udB9H+g9Lkm68G20fQMC+F6YzLxJhmwuZu4
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list