MD5 Hash Collisions

Open discussion about any topic, as long as you abide by the rules of course!
Post Reply
saturn
Posts: 4334
Joined: Mon Mar 06, 2000 8:00 am
Location: The Netherlands

MD5 Hash Collisions

Post by saturn »

Uhmmm....apparently they can generate the same MD5 Hash for different documents. This is a potential weakness for digital signatures.

http://www.cits.rub.de/MD5Collisions/

Maybe this is interesting for cryptographers/hackers :icon32:
saturn
Posts: 4334
Joined: Mon Mar 06, 2000 8:00 am
Location: The Netherlands

Post by saturn »

Took me a while before I even realised what an MD5 Hash was.

Real nerd stuff
User avatar
seremtan
Posts: 36019
Joined: Wed Nov 19, 2003 8:00 am

Post by seremtan »

the password database of this bb is md5 hashed - isn't it?
saturn
Posts: 4334
Joined: Mon Mar 06, 2000 8:00 am
Location: The Netherlands

Post by saturn »

that's quite possible :paranoid:
User avatar
MKJ
Posts: 32582
Joined: Fri Nov 24, 2000 8:00 am

Post by MKJ »

seremtan wrote:the password database of this bb is md5 hashed - isn't it?
way ahead of you :paranoid:
[url=http://profile.mygamercard.net/Emka+Jee][img]http://card.mygamercard.net/sig/Emka+Jee.jpg[/img][/url]
Denz
Posts: 2587
Joined: Thu Aug 17, 2000 7:00 am

Post by Denz »

Say it ain't so!! :paranoid:
glossy
Posts: 2282
Joined: Tue Apr 30, 2002 7:00 am

Post by glossy »

seremtan wrote:the password database of this bb is md5 hashed - isn't it?
yeah, it is.

the chances of md5 collisions on short strings like passwords and the like are too small to worry about, imo, and if you're calculating much larger documents, a stronger solution (with more detailed/longer output) should be used.
^misantropia^
Posts: 4022
Joined: Sat Mar 12, 2005 6:24 pm

Re: MD5 Hash Collisions

Post by ^misantropia^ »

saturn wrote:Uhmmm....apparently they can generate the same MD5 Hash for different documents. This is a potential weakness for digital signatures.

http://www.cits.rub.de/MD5Collisions/

Maybe this is interesting for cryptographers/hackers :icon32:
It only works in special cases... for now. But since they've found a special case it probably won't be long before someone finds a way to apply it in general. There's an interesting Slashdot article here.
saturn
Posts: 4334
Joined: Mon Mar 06, 2000 8:00 am
Location: The Netherlands

Post by saturn »

I tried to read the comments, but it's all going over my head.
User avatar
seremtan
Posts: 36019
Joined: Wed Nov 19, 2003 8:00 am

Post by seremtan »

glossy wrote:
seremtan wrote:the password database of this bb is md5 hashed - isn't it?
yeah, it is.

the chances of md5 collisions on short strings like passwords and the like are too small to worry about, imo, and if you're calculating much larger documents, a stronger solution (with more detailed/longer output) should be used.
Hm, but I guess there will always be the possibility of collisions in the output of non-reversible algorithms so it was inevitable. I guess if the hex code is long enough it'll have more combinations than there are atoms in the universe or someshit, and problem solved.
^misantropia^
Posts: 4022
Joined: Sat Mar 12, 2005 6:24 pm

Post by ^misantropia^ »

seremtan wrote:Hm, but I guess there will always be the possibility of collisions in the output of non-reversible algorithms so it was inevitable.
Correct. Moreover, since you lose information when hashing, collisions aren't a possibilty, they are inevitable. The trick is getting two pieces of data to hash to the same value. Which is now feasible (since August 2004 already, actually).
seremtan wrote:I guess if the hex code is long enough it'll have more combinations than there are atoms in the universe or someshit, and problem solved.
Incorrect. Enlarging the hash is pointless if the underlying algorithm is weak.
User avatar
GONNAFISTYA
Posts: 13369
Joined: Sun Jan 23, 2005 8:20 pm

Post by GONNAFISTYA »

Fuckin nerds.
User avatar
Foo
Posts: 13840
Joined: Thu Aug 03, 2000 7:00 am
Location: New Zealand

Post by Foo »

seremtan wrote:the password database of this bb is md5 hashed - isn't it?
If someone generates a hash collision for your password on this site, all they get is access to your account here.

Generating a collision does not give you the original password. Indeed, the original password isn't stored ANYWHERE on the site, only the MD5 exists now.
"Maybe you have some bird ideas. Maybe that’s the best you can do."
― Terry A. Davis
Post Reply