PlayStation 3 predicts next US president

James A. Donald jamesd at
Fri Dec 7 18:22:47 EST 2007

William Allen Simpson wrote:
 > The notary would never sign a hash generated by
 > somebody else.  Instead, the notary generates its own
 > document (from its own tuples), and signs its own
 > document, documenting that some other document was
 > submitted by some person before some particular time.

And how does it identify this "other document"?

The notary is only safe from this flaw in MD5 if you
assume he is not using MD5 for its intended purpose.

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at

More information about the cryptography mailing list