[Cryptography] let's kill md5sum!

Tony Arcieri bascule at gmail.com
Tue Jun 9 01:29:53 EDT 2015


On Sun, Jun 7, 2015 at 10:45 PM, Ryan Carboni <ryacko at gmail.com> wrote:

> The attack is from 2007. The year is 2015. As time goes on, new attacks
> are less likely to be developed, not more.
>

Wrong. As the expression goes, "attacks only get better". If Tiger hasn't
been broken yet, it's probably because too few people care, probably
because it's obscure and rarely used.


> Furthermore... compared to SHA-1, RIPEMD, and MD5, Tiger is secure.
>

I wouldn't recommend you use any of those either, but that said, Tiger is
effectively broken at this point and shouldn't be used.

The fact you're recommending it when 23 out of 24 rounds have been broken
is completely ludicrous. That should be a clear sign to run away.

--
Tony Arcieri
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150608/e08e642c/attachment.html>


More information about the cryptography mailing list