MD5 Hash Collisions
MD5 Hash Collisions
Uhmmm....apparently they can generate the same MD5 Hash for different documents. This is a potential weakness for digital signatures.
http://www.cits.rub.de/MD5Collisions/
Maybe this is interesting for cryptographers/hackers :icon32:
http://www.cits.rub.de/MD5Collisions/
Maybe this is interesting for cryptographers/hackers :icon32:
yeah, it is.seremtan wrote:the password database of this bb is md5 hashed - isn't it?
the chances of md5 collisions on short strings like passwords and the like are too small to worry about, imo, and if you're calculating much larger documents, a stronger solution (with more detailed/longer output) should be used.
-
^misantropia^
- Posts: 4022
- Joined: Sat Mar 12, 2005 6:24 pm
Re: MD5 Hash Collisions
It only works in special cases... for now. But since they've found a special case it probably won't be long before someone finds a way to apply it in general. There's an interesting Slashdot article here.saturn wrote:Uhmmm....apparently they can generate the same MD5 Hash for different documents. This is a potential weakness for digital signatures.
http://www.cits.rub.de/MD5Collisions/
Maybe this is interesting for cryptographers/hackers :icon32:
Hm, but I guess there will always be the possibility of collisions in the output of non-reversible algorithms so it was inevitable. I guess if the hex code is long enough it'll have more combinations than there are atoms in the universe or someshit, and problem solved.glossy wrote:yeah, it is.seremtan wrote:the password database of this bb is md5 hashed - isn't it?
the chances of md5 collisions on short strings like passwords and the like are too small to worry about, imo, and if you're calculating much larger documents, a stronger solution (with more detailed/longer output) should be used.
-
^misantropia^
- Posts: 4022
- Joined: Sat Mar 12, 2005 6:24 pm
Correct. Moreover, since you lose information when hashing, collisions aren't a possibilty, they are inevitable. The trick is getting two pieces of data to hash to the same value. Which is now feasible (since August 2004 already, actually).seremtan wrote:Hm, but I guess there will always be the possibility of collisions in the output of non-reversible algorithms so it was inevitable.
Incorrect. Enlarging the hash is pointless if the underlying algorithm is weak.seremtan wrote:I guess if the hex code is long enough it'll have more combinations than there are atoms in the universe or someshit, and problem solved.
If someone generates a hash collision for your password on this site, all they get is access to your account here.seremtan wrote:the password database of this bb is md5 hashed - isn't it?
Generating a collision does not give you the original password. Indeed, the original password isn't stored ANYWHERE on the site, only the MD5 exists now.
"Maybe you have some bird ideas. Maybe that’s the best you can do."
― Terry A. Davis
― Terry A. Davis